CERT Rule | Related Guidelines | |||
---|---|---|---|---|
IDS00-J | CWE-116, Improper Encoding or Escaping of Output | |||
IDS01-J | CWE-289, Authentication bypass by alternate name | |||
IDS03-J | CWE-144, Improper neutralization of line delimiters | |||
IDS04-J | CWE-409, Improper Handling of Highly Compressed Data (Data Amplification) | |||
IDS06-J | CWE-134, Uncontrolled Format String | |||
IDS07-J | CWE-78, Improper Neutralization of Special Elements Used in an OS Command ("OS Command Injection") | |||
IDS11-J | CWE-182, Collapse of Data into Unsafe Value | |||
IDS16-J | CWE-116, Improper Encoding or Escaping of Output | |||
IDS17-J | CWE-116, Improper Encoding or Escaping of Output | |||
EXP00-J | CWE-252, Unchecked Return Value | |||
EXP01-J | CWE-476, NULL Pointer Dereference | |||
EXP02-J | CWE-595, Comparison of Object References Instead of Object Contents | |||
EXP03-J | CWE-595, Comparison of Object References Instead of Object Contents | |||
NUM00-J | CWE-682, Incorrect Calculation | |||
NUM02-J | CWE-369, Divide by Zero | |||
NUM12-J | CWE-681, Incorrect Conversion between Numeric Types | |||
STR03-J | CWE-838, Inappropriate Encoding for Output Context | |||
OBJ01-J | CWE-766, Critical Variable Declared Public | |||
OBJ04-J | CWE-374, Passing Mutable Objects to an Untrusted Method | |||
OBJ05-J | CWE-375, Returning a Mutable Object to an Untrusted Caller | |||
OBJ08-J | CWE-492, Use of Inner Class Containing Sensitive Data | |||
OBJ09-J | CWE-486, Comparison of Classes by Name | |||
OBJ10-J | CWE-493, Critical Public Variable without Final Modifier | |||
MET01-J | CWE-617, Reachable Assertion | |||
MET02-J | CWE-589, Call to Non-ubiquitous API | |||
MET04-J | CWE-487, Reliance on Package-Level Scope | |||
MET08-J | CWE-697, Insufficient Comparison | |||
MET09-J | CWE-581, Object Model Violation: Just One of | |||
MET10-J | CWE-573, Improper Following of Specification by Caller | |||
MET12-J | CWE-586, Explicit call to | |||
ERR00-J | CWE-390, Detection of Error Condition without Action | |||
ERR01-J | CWE-209, Information Exposure through an Error Message | |||
ERR03-J | CWE-460, Improper Cleanup on Thrown Exception | |||
ERR04-J | CWE-459, Incomplete Cleanup | |||
ERR05-J | CWE-248, Uncaught Exception | |||
ERR06-J | CWE-703, Improper Check or Handling of Exceptional Conditions | |||
ERR07-J | CWE-397, Declaration of Throws for Generic Exception | |||
ERR09-J | CWE-382, J2EE Bad Practices: Use of | |||
VNA00-J | CWE-413, Improper Resource Locking | |||
VNA03-J | CWE-362, Concurrent Execution Using Shared Resource with Improper Synchronization ("Race Condition") | |||
VNA05-J | CWE-667, Improper Locking | |||
LCK00-J | CWE-412. Unrestricted externally accessible lock | |||
LCK05-J | CWE-820, Missing Synchronization | |||
LCK06-J | CWE-667, Improper Locking | |||
LCK07-J | CWE-833, Deadlock | |||
LCK08-J | CWE-883, Deadlock | |||
LCK10-J | CWE-609, Double-checked Locking | |||
THI00-J | CWE-572, Call to | |||
THI05-J | CWE-705, Incorrect Control Flow Scoping | |||
TPS00-J | CWE-405, Asymmetric Resource Consumption (Amplification) | |||
TPS03-J | CWE-392, Missing Report of Error Condition | |||
FIO00-J | CWE-67, Improper Handling of Windows Device Names | |||
FIO01-J | CWE-279, Incorrect Execution-Assigned Permissions | |||
FIO03-J | Incomplete Cleanup | |||
FIO04-J | CWE-404, Improper Resource Shutdown or Release | |||
FIO09-J | CWE-252, Unchecked Return Value | |||
FIO10-J | CWE-135, Incorrect Calculation of Multi-byte String Length | |||
FIO12-J | CWE-198, Use of Incorrect Byte Ordering | |||
FIO13-J | CWE-359, Privacy Violation | |||
FIO14-J | CWE-705, Incorrect Control Flow Scoping | |||
FIO16-J | CWE-171, Cleansing, Canonicalization, and Comparison Errors | |||
SER00-J | CWE-589, Call to Non-ubiquitous API | |||
SER01-J | CWE-502, Deserialization of Untrusted Data | |||
SER02-J | CWE-319, Cleartext Transmission of Sensitive Information | |||
SER03-J | CWE-499, Serializable Class Containing Sensitive Data | |||
SER05-J | CWE-499, Serializable Class Containing Sensitive Data | |||
SER06-J | CWE-502, Deserialization of Untrusted Data | |||
SER07-J | CWE-502, "Deserialization of Untrusted Data" | |||
SER08-J | CWE-250, Execution with Unnecessary Privileges | |||
SER10-J | CWE-400, Uncontrolled Resource Consumption (aka "Resource Exhaustion") | |||
SER12-J | CWE-502, Deserialization of Untrusted Data | |||
SER13-J | CWE-502, Deserialization of Untrusted Data | |||
SEC00-J | CWE-266, Incorrect Privilege Assignment | |||
SEC01-J | CWE-266, Incorrect Privilege Assignment | |||
SEC02-J | CWE-302, Authentication Bypass by Assumed-Immutable Data | |||
SEC06-J | CWE-300, Channel Accessible by Non-endpoint (aka "Man-in-the-Middle") | |||
ENV01-J | CWE-349, Acceptance of Extraneous Untrusted Data with Trusted Data | |||
ENV03-J | CWE-732, Incorrect Permission Assignment for Critical Resource | |||
JNI00-J | CWE-111, Direct Use of Unsafe JNI | |||
MSC00-J | CWE-311, Failure to Encrypt Sensitive Data | |||
MSC02-J | CWE-327, Use of a Broken or Risky Cryptographic Algorithm | |||
MSC03-J | CWE-259, Use of Hard-Coded Password | |||
MSC04-J | CWE-401, Improper Release of Memory before Removing Last Reference ("Memory Leak") | |||
MSC05-J | CWE-400, Uncontrolled Resource Consumption ("Resource Exhaustion") | |||
IDS50-J | CWE-116, Improper encoding or escaping of output | |||
STR51-J | CWE-838. Inappropriate Encoding for Output Context |