CERT Rule | Related Guidelines |
---|---|
IDS00-J | CWE-116, Improper Encoding or Escaping of Output |
IDS01-J | CWE-289, Authentication bypass by alternate name |
IDS03-J | CWE-144, Improper neutralization of line delimiters |
IDS04-J | CWE-409, Improper Handling of Highly Compressed Data (Data Amplification) |
IDS06-J | CWE-134, Uncontrolled Format String |
IDS07-J | CWE-78, Improper Neutralization of Special Elements Used in an OS Command ("OS Command Injection") |
IDS11-J | CWE-182, Collapse of Data into Unsafe Value |
IDS16-J | CWE-116, Improper Encoding or Escaping of Output |
IDS17-J | CWE-116, Improper Encoding or Escaping of Output |
EXP00-J | CWE-252, Unchecked Return Value |
EXP01-J | CWE-476, NULL Pointer Dereference |
EXP02-J | CWE-595, Comparison of Object References Instead of Object Contents |
EXP03-J | CWE-595, Comparison of Object References Instead of Object Contents |
NUM00-J | CWE-682, Incorrect Calculation |
NUM02-J | CWE-369, Divide by Zero |
NUM12-J | CWE-681, Incorrect Conversion between Numeric Types |
STR03-J | CWE-838, Inappropriate Encoding for Output Context |
OBJ01-J | CWE-766, Critical Variable Declared Public |
OBJ04-J | CWE-374, Passing Mutable Objects to an Untrusted Method |
OBJ05-J | CWE-375, Returning a Mutable Object to an Untrusted Caller |
OBJ08-J | CWE-492, Use of Inner Class Containing Sensitive Data |
OBJ09-J | CWE-486, Comparison of Classes by Name |
OBJ10-J | CWE-493, Critical Public Variable without Final Modifier |
MET01-J | CWE-617, Reachable Assertion |
MET02-J | CWE-589, Call to Non-ubiquitous API |
MET04-J | CWE-487, Reliance on Package-Level Scope |
MET08-J | CWE-697, Insufficient Comparison |
MET09-J | CWE-581, Object Model Violation: Just One of |
MET10-J | CWE-573, Improper Following of Specification by Caller |
MET12-J | CWE-586, Explicit call to |
ERR00-J | CWE-390, Detection of Error Condition without Action |
ERR01-J | CWE-209, Information Exposure through an Error Message |
ERR03-J | CWE-460, Improper Cleanup on Thrown Exception |
ERR04-J | CWE-459, Incomplete Cleanup |
ERR05-J | CWE-248, Uncaught Exception |
ERR06-J | CWE-703, Improper Check or Handling of Exceptional Conditions |
ERR07-J | CWE-397, Declaration of Throws for Generic Exception |
ERR09-J | CWE-382, J2EE Bad Practices: Use of |
VNA00-J | CWE-413, Improper Resource Locking |
VNA03-J | CWE-362, Concurrent Execution Using Shared Resource with Improper Synchronization ("Race Condition") |
VNA05-J | CWE-667, Improper Locking |
LCK00-J | CWE-412. Unrestricted externally accessible lock |
LCK05-J | CWE-820, Missing Synchronization |
LCK06-J | CWE-667, Improper Locking |
LCK07-J | CWE-833, Deadlock |
LCK08-J | CWE-883, Deadlock |
LCK10-J | CWE-609, Double-checked Locking |
THI00-J | CWE-572, Call to |
THI05-J | CWE-705, Incorrect Control Flow Scoping |
TPS00-J | CWE-405, Asymmetric Resource Consumption (Amplification) |
TPS03-J | CWE-392, Missing Report of Error Condition |
FIO00-J | CWE-67, Improper Handling of Windows Device Names |
FIO01-J | CWE-279, Incorrect Execution-Assigned Permissions |
FIO03-J | |
FIO04-J | CWE-404, Improper Resource Shutdown or Release |
FIO09-J | CWE-252, Unchecked Return Value |
FIO10-J | CWE-135, Incorrect Calculation of Multi-byte String Length |
FIO12-J | CWE-198, Use of Incorrect Byte Ordering |
FIO13-J | CWE-359, Privacy Violation |
FIO14-J | CWE-705, Incorrect Control Flow Scoping |
FIO16-J | CWE-171, Cleansing, Canonicalization, and Comparison Errors |
SER00-J | CWE-589, Call to Non-ubiquitous API |
SER01-J | CWE-502, Deserialization of Untrusted Data |
SER02-J | CWE-319, Cleartext Transmission of Sensitive Information |
SER03-J | CWE-499, Serializable Class Containing Sensitive Data |
SER05-J | CWE-499, Serializable Class Containing Sensitive Data |
SER06-J | CWE-502, Deserialization of Untrusted Data |
SER07-J | CWE-502, "Deserialization of Untrusted Data" |
SER08-J | CWE-250, Execution with Unnecessary Privileges |
SER10-J | CWE-400, Uncontrolled Resource Consumption (aka "Resource Exhaustion") |
SER12-J | CWE-502, Deserialization of Untrusted Data |
SER13-J | CWE-502, Deserialization of Untrusted Data |
SEC00-J | CWE-266, Incorrect Privilege Assignment |
SEC01-J | CWE-266, Incorrect Privilege Assignment |
SEC02-J | CWE-302, Authentication Bypass by Assumed-Immutable Data |
SEC06-J | CWE-300, Channel Accessible by Non-endpoint (aka "Man-in-the-Middle") |
ENV01-J | CWE-349, Acceptance of Extraneous Untrusted Data with Trusted Data |
ENV03-J | CWE-732, Incorrect Permission Assignment for Critical Resource |
JNI00-J | CWE-111, Direct Use of Unsafe JNI |
MSC00-J | CWE-311, Failure to Encrypt Sensitive Data |
MSC02-J | CWE-327, Use of a Broken or Risky Cryptographic Algorithm |
MSC03-J | CWE-259, Use of Hard-Coded Password |
MSC04-J | CWE-401, Improper Release of Memory before Removing Last Reference ("Memory Leak") |
MSC05-J | CWE-400, Uncontrolled Resource Consumption ("Resource Exhaustion") |
IDS50-J | CWE-116, Improper encoding or escaping of output |
STR51-J | CWE-838. Inappropriate Encoding for Output Context |