[{"data":1,"prerenderedAt":4037},["ShallowReactive",2],{"global-navigation":3,"page-\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe":28,"surround-\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe":2290,"sidebar-sei-cert-c-coding-standard":2299},[4,8],{"title":5,"path":6,"_path":6,"fromAppConfig":7},"Home","\u002F",true,{"title":9,"path":10,"children":11,"_path":27,"fromAppConfig":7},"Coding Standards","\u002Fcoding-standards\u002F",[12,15,18,21,24],{"title":13,"path":14},"Android Coding Standard","\u002Fandroid-secure-coding-standard\u002F",{"title":16,"path":17},"C Coding Standard","\u002Fsei-cert-c-coding-standard\u002F",{"title":19,"path":20},"C++ Coding Standard","\u002Fsei-cert-cpp-coding-standard\u002F",{"title":22,"path":23},"Java Coding Standard","\u002Fsei-cert-oracle-coding-standard-for-java\u002F",{"title":25,"path":26},"Perl Coding Standard","\u002Fsei-cert-perl-coding-standard\u002F","\u002Fcoding-standards",{"id":29,"title":30,"body":31,"description":41,"extension":2284,"meta":2285,"navigation":7,"path":2286,"seo":2287,"stem":2288,"__hash__":2289},"content\u002F4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F11.mitre-cwe.md","MITRE CWE",{"type":32,"value":33,"toc":2280},"minimark",[34,38,42,45],[35,36,30],"h1",{"id":37},"mitre-cwe",[39,40,41],"p",{},"This page was automatically generated and should not be edited.",[39,43,44],{},"The information on this page was provided by outside contributors and has not been verified by SEI CERT.",[46,47,48,59],"table",{},[49,50,51],"thead",{},[52,53,54,57],"tr",{},[55,56],"th",{},[55,58],{},[60,61,62,71,89,105,119,134,149,162,175,188,200,213,226,239,254,267,282,295,311,325,339,353,369,382,395,411,427,443,457,471,487,501,517,531,545,559,571,587,601,617,633,647,661,675,689,703,717,731,747,761,777,793,809,825,838,852,868,882,893,909,923,937,951,965,979,990,1006,1020,1034,1048,1062,1076,1092,1106,1120,1136,1150,1163,1179,1193,1207,1221,1235,1251,1267,1281,1296,1310,1323,1334,1347,1360,1374,1387,1400,1413,1427,1443,1457,1470,1481,1497,1511,1527,1543,1557,1570,1584,1597,1608,1619,1630,1641,1652,1663,1676,1692,1706,1720,1736,1752,1768,1784,1795,1810,1825,1839,1853,1867,1881,1895,1907,1922,1933,1944,1955,1966,1977,1988,2002,2013,2024,2035,2049,2060,2071,2084,2096,2108,2124,2138,2154,2168,2181,2192,2208,2219,2232,2245,2256,2269],"tbody",{},[52,63,64,68],{},[65,66,67],"td",{},"CERT Rule",[65,69,70],{},"Related Guidelines",[52,72,73,80],{},[65,74,75],{},[76,77,79],"a",{"href":78},"\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr34-c","STR34-C",[65,81,82,88],{},[76,83,87],{"href":84,"rel":85},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F704.html",[86],"nofollow","CWE-704"," , Incorrect Type Conversion or Cast",[52,90,91,97],{},[65,92,93],{},[76,94,96],{"href":95},"\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc41-c","MSC41-C",[65,98,99,104],{},[76,100,103],{"href":101,"rel":102},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F259.html",[86],"CWE-259"," , Use of Hard-Coded Password",[52,106,107,111],{},[65,108,109],{},[76,110,96],{"href":95},[65,112,113,118],{},[76,114,117],{"href":115,"rel":116},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F798.html",[86],"CWE-798"," , Use of Hard-Coded Credentials",[52,120,121,127],{},[65,122,123],{},[76,124,126],{"href":125},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi00-c","API00-C",[65,128,129],{},[76,130,133],{"href":131,"rel":132},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html476.html",[86],"CWE-476",[52,135,136,142],{},[65,137,138],{},[76,139,141],{"href":140},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi07-c","API07-C",[65,143,144],{},[76,145,148],{"href":146,"rel":147},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html192.html",[86],"CWE-192",[52,150,151,155],{},[65,152,153],{},[76,154,141],{"href":140},[65,156,157],{},[76,158,161],{"href":159,"rel":160},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html227.html",[86],"CWE-227",[52,163,164,168],{},[65,165,166],{},[76,167,141],{"href":140},[65,169,170],{},[76,171,174],{"href":172,"rel":173},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html590.html",[86],"CWE-590",[52,176,177,181],{},[65,178,179],{},[76,180,141],{"href":140},[65,182,183],{},[76,184,187],{"href":185,"rel":186},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html686.html",[86],"CWE-686",[52,189,190,194],{},[65,191,192],{},[76,193,141],{"href":140},[65,195,196],{},[76,197,87],{"href":198,"rel":199},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html704.html",[86],[52,201,202,206],{},[65,203,204],{},[76,205,141],{"href":140},[65,207,208],{},[76,209,212],{"href":210,"rel":211},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html761.html",[86],"CWE-761",[52,214,215,219],{},[65,216,217],{},[76,218,141],{"href":140},[65,220,221],{},[76,222,225],{"href":223,"rel":224},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html762.html",[86],"CWE-762",[52,227,228,232],{},[65,229,230],{},[76,231,141],{"href":140},[65,233,234],{},[76,235,238],{"href":236,"rel":237},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html843.html",[86],"CWE-843",[52,240,241,247],{},[65,242,243],{},[76,244,246],{"href":245},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Farrays-arr\u002Farr01-c","ARR01-C",[65,248,249],{},[76,250,253],{"href":251,"rel":252},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html569.html",[86],"CWE-569",[52,255,256,260],{},[65,257,258],{},[76,259,246],{"href":245},[65,261,262],{},[76,263,266],{"href":264,"rel":265},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html783.html",[86],"CWE-783",[52,268,269,275],{},[65,270,271],{},[76,272,274],{"href":273},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon05-c","CON05-C",[65,276,277],{},[76,278,281],{"href":279,"rel":280},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html557.html",[86],"CWE-557",[52,283,284,288],{},[65,285,286],{},[76,287,274],{"href":273},[65,289,290],{},[76,291,294],{"href":292,"rel":293},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Findex.html662.html",[86],"CWE-662",[52,296,297,303],{},[65,298,299],{},[76,300,302],{"href":301},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon07-c","CON07-C",[65,304,305,310],{},[76,306,309],{"href":307,"rel":308},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F366.html",[86],"CWE-366"," , Race condition within a thread",[52,312,313,317],{},[65,314,315],{},[76,316,302],{"href":301},[65,318,319,324],{},[76,320,323],{"href":321,"rel":322},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F413.html",[86],"CWE-413,"," Improper resource locking",[52,326,327,331],{},[65,328,329],{},[76,330,302],{"href":301},[65,332,333,338],{},[76,334,337],{"href":335,"rel":336},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F567.html",[86],"CWE-567,"," Unsynchronized access to shared data in a multithreaded context",[52,340,341,345],{},[65,342,343],{},[76,344,302],{"href":301},[65,346,347,352],{},[76,348,351],{"href":349,"rel":350},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F667.html",[86],"CWE-667"," , Improper locking",[52,354,355,361],{},[65,356,357],{},[76,358,360],{"href":359},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon08-c","CON08-C",[65,362,363,368],{},[76,364,367],{"href":365,"rel":366},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F362.html",[86],"CWE-362"," , Concurrent execution using shared resource with improper synchronization (\"race condition\")",[52,370,371,375],{},[65,372,373],{},[76,374,360],{"href":359},[65,376,377,381],{},[76,378,380],{"href":307,"rel":379},[86],"CWE-366,"," Race condition within a thread",[52,383,384,388],{},[65,385,386],{},[76,387,360],{"href":359},[65,389,390,394],{},[76,391,294],{"href":392,"rel":393},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F662.html",[86]," , Improper synchronization",[52,396,397,403],{},[65,398,399],{},[76,400,402],{"href":401},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl06-c","DCL06-C",[65,404,405,410],{},[76,406,409],{"href":407,"rel":408},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F547.html",[86],"CWE-547"," , Use of hard-coded, security-relevant constants",[52,412,413,419],{},[65,414,415],{},[76,416,418],{"href":417},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl10-c","DCL10-C",[65,420,421,426],{},[76,422,425],{"href":423,"rel":424},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F628.html",[86],"CWE-628"," , Function call with incorrectly specified arguments",[52,428,429,435],{},[65,430,431],{},[76,432,434],{"href":433},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fenvironment-env\u002Fenv01-c","ENV01-C",[65,436,437,442],{},[76,438,441],{"href":439,"rel":440},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F119.html",[86],"CWE-119"," , Improper Restriction of Operations within the Bounds of a Memory Buffer",[52,444,445,449],{},[65,446,447],{},[76,448,434],{"href":433},[65,450,451,456],{},[76,452,455],{"href":453,"rel":454},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F123.html",[86],"CWE-123"," , Write-what-where Condition",[52,458,459,463],{},[65,460,461],{},[76,462,434],{"href":433},[65,464,465,470],{},[76,466,469],{"href":467,"rel":468},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F125.html",[86],"CWE-125"," , Out-of-bounds Read",[52,472,473,479],{},[65,474,475],{},[76,476,478],{"href":477},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fenvironment-env\u002Fenv02-c","ENV02-C",[65,480,481,486],{},[76,482,485],{"href":483,"rel":484},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F462.html",[86],"CWE-462"," , Duplicate key in associative list (Alist)",[52,488,489,493],{},[65,490,491],{},[76,492,478],{"href":477},[65,494,495,500],{},[76,496,499],{"href":497,"rel":498},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F807.html",[86],"CWE-807"," , Reliance on untrusted inputs in a security decision",[52,502,503,509],{},[65,504,505],{},[76,506,508],{"href":507},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fenvironment-env\u002Fenv03-c","ENV03-C",[65,510,511,516],{},[76,512,515],{"href":513,"rel":514},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F78.html",[86],"CWE-78"," , Failure to sanitize data into an OS command (aka \"OS command injection\")",[52,518,519,523],{},[65,520,521],{},[76,522,508],{"href":507},[65,524,525,530],{},[76,526,529],{"href":527,"rel":528},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F88.html",[86],"CWE-88"," , Argument injection or modification",[52,532,533,537],{},[65,534,535],{},[76,536,508],{"href":507},[65,538,539,544],{},[76,540,543],{"href":541,"rel":542},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F426.html",[86],"CWE-426"," , Untrusted search path",[52,546,547,551],{},[65,548,549],{},[76,550,508],{"href":507},[65,552,553,558],{},[76,554,557],{"href":555,"rel":556},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F471.html",[86],"CWE-471"," , Modification of Assumed-Immutable Data (MAID)",[52,560,561,565],{},[65,562,563],{},[76,564,508],{"href":507},[65,566,567,570],{},[76,568,499],{"href":497,"rel":569},[86]," , Reliance on intrusted inputs in a security decision",[52,572,573,579],{},[65,574,575],{},[76,576,578],{"href":577},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr00-c","ERR00-C",[65,580,581,586],{},[76,582,585],{"href":583,"rel":584},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F391.html",[86],"CWE-391"," , Unchecked error condition",[52,588,589,593],{},[65,590,591],{},[76,592,578],{"href":577},[65,594,595,600],{},[76,596,599],{"href":597,"rel":598},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F544.html",[86],"CWE-544"," , Missing standardized error handling mechanism",[52,602,603,609],{},[65,604,605],{},[76,606,608],{"href":607},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr04-c","ERR04-C",[65,610,611,616],{},[76,612,615],{"href":613,"rel":614},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F705.html",[86],"CWE-705"," , Incorrect control flow scoping",[52,618,619,625],{},[65,620,621],{},[76,622,624],{"href":623},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr07-c","ERR07-C",[65,626,627,632],{},[76,628,631],{"href":629,"rel":630},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F20.html",[86],"CWE-20"," , Improper Input Validation",[52,634,635,639],{},[65,636,637],{},[76,638,624],{"href":623},[65,640,641,646],{},[76,642,645],{"href":643,"rel":644},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F79.html",[86],"CWE-79"," , Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",[52,648,649,653],{},[65,650,651],{},[76,652,624],{"href":623},[65,654,655,660],{},[76,656,659],{"href":657,"rel":658},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F89.html",[86],"CWE-89"," , Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",[52,662,663,667],{},[65,664,665],{},[76,666,624],{"href":623},[65,668,669,674],{},[76,670,673],{"href":671,"rel":672},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F91.html",[86],"CWE-91"," , XML Injection (aka Blind XPath Injection)",[52,676,677,681],{},[65,678,679],{},[76,680,624],{"href":623},[65,682,683,688],{},[76,684,687],{"href":685,"rel":686},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F94.html",[86],"CWE-94"," , Improper Control of Generation of Code ('Code Injection')",[52,690,691,695],{},[65,692,693],{},[76,694,624],{"href":623},[65,696,697,702],{},[76,698,701],{"href":699,"rel":700},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F114.html",[86],"CWE-114"," , Process Control",[52,704,705,709],{},[65,706,707],{},[76,708,624],{"href":623},[65,710,711,716],{},[76,712,715],{"href":713,"rel":714},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F601.html",[86],"CWE-601"," , URL Redirection to Untrusted Site ('Open Redirect')",[52,718,719,723],{},[65,720,721],{},[76,722,624],{"href":623},[65,724,725,730],{},[76,726,729],{"href":727,"rel":728},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F676.html",[86],"CWE-676"," , Use of potentially dangerous function",[52,732,733,739],{},[65,734,735],{},[76,736,738],{"href":737},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp02-c","EXP02-C",[65,740,741,746],{},[76,742,745],{"href":743,"rel":744},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F768.html",[86],"CWE-768"," , Incorrect short circuit evaluation",[52,748,749,755],{},[65,750,751],{},[76,752,754],{"href":753},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp05-c","EXP05-C",[65,756,757,760],{},[76,758,87],{"href":84,"rel":759},[86]," , Incorrect type conversion or cast",[52,762,763,769],{},[65,764,765],{},[76,766,768],{"href":767},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp08-c","EXP08-C",[65,770,771,776],{},[76,772,775],{"href":773,"rel":774},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F468.html",[86],"CWE-468"," , Incorrect pointer scaling",[52,778,779,785],{},[65,780,781],{},[76,782,784],{"href":783},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp09-c","EXP09-C",[65,786,787,792],{},[76,788,791],{"href":789,"rel":790},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F805.html",[86],"CWE-805"," , Buffer access with incorrect length value",[52,794,795,801],{},[65,796,797],{},[76,798,800],{"href":799},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp12-c","EXP12-C",[65,802,803,808],{},[76,804,807],{"href":805,"rel":806},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F754.html",[86],"CWE-754"," , Improper check for unusual or exceptional conditions",[52,810,811,817],{},[65,812,813],{},[76,814,816],{"href":815},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp15-c","EXP15-C",[65,818,819,824],{},[76,820,823],{"href":821,"rel":822},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F480.html",[86],"CWE-480"," , Use of incorrect operator",[52,826,827,833],{},[65,828,829],{},[76,830,832],{"href":831},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp16-c","EXP16-C",[65,834,835,824],{},[76,836,823],{"href":821,"rel":837},[86],[52,839,840,844],{},[65,841,842],{},[76,843,832],{"href":831},[65,845,846,851],{},[76,847,850],{"href":848,"rel":849},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F482.html",[86],"CWE-482"," , Comparing instead of assigning",[52,853,854,860],{},[65,855,856],{},[76,857,859],{"href":858},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio01-c","FIO01-C",[65,861,862,867],{},[76,863,866],{"href":864,"rel":865},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F73.html",[86],"CWE-73"," , External control of file name or path",[52,869,870,874],{},[65,871,872],{},[76,873,859],{"href":858},[65,875,876,881],{},[76,877,880],{"href":878,"rel":879},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F367.html",[86],"CWE-367"," , Time-of-check, time-of-use race condition",[52,883,884,888],{},[65,885,886],{},[76,887,859],{"href":858},[65,889,890,730],{},[76,891,729],{"href":727,"rel":892},[86],[52,894,895,901],{},[65,896,897],{},[76,898,900],{"href":899},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio02-c","FIO02-C",[65,902,903,908],{},[76,904,907],{"href":905,"rel":906},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F22.html",[86],"CWE-22"," , Path traversal",[52,910,911,915],{},[65,912,913],{},[76,914,900],{"href":899},[65,916,917,922],{},[76,918,921],{"href":919,"rel":920},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F23.html",[86],"CWE-23"," , Relative Path Traversal",[52,924,925,929],{},[65,926,927],{},[76,928,900],{"href":899},[65,930,931,936],{},[76,932,935],{"href":933,"rel":934},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F28.html",[86],"CWE-28"," , Path Traversal: '..\\filedir'",[52,938,939,943],{},[65,940,941],{},[76,942,900],{"href":899},[65,944,945,950],{},[76,946,949],{"href":947,"rel":948},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F40.html",[86],"CWE-40"," , Path Traversal: '\\\\UNC\\share\\name\\' (Windows UNC Share)",[52,952,953,957],{},[65,954,955],{},[76,956,900],{"href":899},[65,958,959,964],{},[76,960,963],{"href":961,"rel":962},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F41.html",[86],"CWE-41"," , Failure to resolve path equivalence",[52,966,967,971],{},[65,968,969],{},[76,970,900],{"href":899},[65,972,973,978],{},[76,974,977],{"href":975,"rel":976},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F59.html",[86],"CWE-59"," , Failure to resolve links before file access (aka \"link following\")",[52,980,981,985],{},[65,982,983],{},[76,984,900],{"href":899},[65,986,987,867],{},[76,988,866],{"href":864,"rel":989},[86],[52,991,992,998],{},[65,993,994],{},[76,995,997],{"href":996},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio05-c","FIO05-C",[65,999,1000,1005],{},[76,1001,1004],{"href":1002,"rel":1003},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F37.html",[86],"CWE-37"," , Path issue—Slash absolute path",[52,1007,1008,1012],{},[65,1009,1010],{},[76,1011,997],{"href":996},[65,1013,1014,1019],{},[76,1015,1018],{"href":1016,"rel":1017},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F38.html",[86],"CWE-38"," , Path Issue—Backslash absolute path",[52,1021,1022,1026],{},[65,1023,1024],{},[76,1025,997],{"href":996},[65,1027,1028,1033],{},[76,1029,1032],{"href":1030,"rel":1031},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F39.html",[86],"CWE-39"," , Path Issue—Drive letter or Windows volume",[52,1035,1036,1040],{},[65,1037,1038],{},[76,1039,997],{"href":996},[65,1041,1042,1047],{},[76,1043,1046],{"href":1044,"rel":1045},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F62.html",[86],"CWE-62"," , UNIX hard link",[52,1049,1050,1054],{},[65,1051,1052],{},[76,1053,997],{"href":996},[65,1055,1056,1061],{},[76,1057,1060],{"href":1058,"rel":1059},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F64.html",[86],"CWE-64"," , Windows shortcut following (.LNK)",[52,1063,1064,1068],{},[65,1065,1066],{},[76,1067,997],{"href":996},[65,1069,1070,1075],{},[76,1071,1074],{"href":1072,"rel":1073},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F65.html",[86],"CWE-65"," , Windows hard link",[52,1077,1078,1084],{},[65,1079,1080],{},[76,1081,1083],{"href":1082},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio06-c","FIO06-C",[65,1085,1086,1091],{},[76,1087,1090],{"href":1088,"rel":1089},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F276.html",[86],"CWE-276"," , Insecure default permissions",[52,1093,1094,1098],{},[65,1095,1096],{},[76,1097,1083],{"href":1082},[65,1099,1100,1105],{},[76,1101,1104],{"href":1102,"rel":1103},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F279.html",[86],"CWE-279"," , Insecure execution-assigned permissions",[52,1107,1108,1112],{},[65,1109,1110],{},[76,1111,1083],{"href":1082},[65,1113,1114,1119],{},[76,1115,1118],{"href":1116,"rel":1117},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F732.html",[86],"CWE-732"," , Incorrect permission assignment for critical resource",[52,1121,1122,1128],{},[65,1123,1124],{},[76,1125,1127],{"href":1126},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio15-c","FIO15-C",[65,1129,1130,1135],{},[76,1131,1134],{"href":1132,"rel":1133},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F379.html",[86],"CWE-379"," , Creation of temporary file in directory with insecure permissions",[52,1137,1138,1142],{},[65,1139,1140],{},[76,1141,1127],{"href":1126},[65,1143,1144,1149],{},[76,1145,1148],{"href":1146,"rel":1147},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F552.html",[86],"CWE-552"," , Files or directories accessible to external parties",[52,1151,1152,1158],{},[65,1153,1154],{},[76,1155,1157],{"href":1156},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio21-c","FIO21-C",[65,1159,1160,1135],{},[76,1161,1134],{"href":1132,"rel":1162},[86],[52,1164,1165,1171],{},[65,1166,1167],{},[76,1168,1170],{"href":1169},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio22-c","FIO22-C",[65,1172,1173,1178],{},[76,1174,1177],{"href":1175,"rel":1176},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F403.html",[86],"CWE-403"," , UNIX file descriptor leak",[52,1180,1181,1185],{},[65,1182,1183],{},[76,1184,1170],{"href":1169},[65,1186,1187,1192],{},[76,1188,1191],{"href":1189,"rel":1190},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F404.html",[86],"CWE-404"," , Improper resource shutdown or release",[52,1194,1195,1199],{},[65,1196,1197],{},[76,1198,1170],{"href":1169},[65,1200,1201,1206],{},[76,1202,1205],{"href":1203,"rel":1204},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F770.html",[86],"CWE-770"," , Allocation of resources without limits or throttling",[52,1208,1209,1215],{},[65,1210,1211],{},[76,1212,1214],{"href":1213},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio24-c","FIO24-C",[65,1216,1217,1220],{},[76,1218,367],{"href":365,"rel":1219},[86]," , Concurrent Execution Using Shared Resource with Improper Synchronization (\"Race Condition\")",[52,1222,1223,1227],{},[65,1224,1225],{},[76,1226,1214],{"href":1213},[65,1228,1229,1234],{},[76,1230,1233],{"href":1231,"rel":1232},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F675.html",[86],"CWE-675"," , Duplicate Operations on Resource",[52,1236,1237,1243],{},[65,1238,1239],{},[76,1240,1242],{"href":1241},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp03-c","FLP03-C",[65,1244,1245,1250],{},[76,1246,1249],{"href":1247,"rel":1248},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F369.html",[86],"CWE-369"," , Divide by zero",[52,1252,1253,1259],{},[65,1254,1255],{},[76,1256,1258],{"href":1257},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp06-c","FLP06-C",[65,1260,1261,1266],{},[76,1262,1265],{"href":1263,"rel":1264},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F681.html",[86],"CWE-681"," , Incorrect conversion between numeric types",[52,1268,1269,1273],{},[65,1270,1271],{},[76,1272,1258],{"href":1257},[65,1274,1275,1280],{},[76,1276,1279],{"href":1277,"rel":1278},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F682.html",[86],"CWE-682"," , Incorrect calculation",[52,1282,1283,1289],{},[65,1284,1285],{},[76,1286,1288],{"href":1287},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint02-c","INT02-C",[65,1290,1291,1295],{},[76,1292,148],{"href":1293,"rel":1294},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F192.html",[86]," , Integer coercion error",[52,1297,1298,1302],{},[65,1299,1300],{},[76,1301,1288],{"href":1287},[65,1303,1304,1309],{},[76,1305,1308],{"href":1306,"rel":1307},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F197.html",[86],"CWE-197"," , Numeric truncation error",[52,1311,1312,1318],{},[65,1313,1314],{},[76,1315,1317],{"href":1316},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint05-c","INT05-C",[65,1319,1320,1295],{},[76,1321,148],{"href":1293,"rel":1322},[86],[52,1324,1325,1329],{},[65,1326,1327],{},[76,1328,1317],{"href":1316},[65,1330,1331,1309],{},[76,1332,1308],{"href":1306,"rel":1333},[86],[52,1335,1336,1342],{},[65,1337,1338],{},[76,1339,1341],{"href":1340},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint07-c","INT07-C",[65,1343,1344,1280],{},[76,1345,1279],{"href":1277,"rel":1346},[86],[52,1348,1349,1355],{},[65,1350,1351],{},[76,1352,1354],{"href":1353},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint10-c","INT10-C",[65,1356,1357,1280],{},[76,1358,1279],{"href":1277,"rel":1359},[86],[52,1361,1362,1366],{},[65,1363,1364],{},[76,1365,1354],{"href":1353},[65,1367,1368,1373],{},[76,1369,1372],{"href":1370,"rel":1371},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F129.html",[86],"CWE-129"," , Unchecked array indexing",[52,1375,1376,1382],{},[65,1377,1378],{},[76,1379,1381],{"href":1380},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint13-c","INT13-C",[65,1383,1384,1280],{},[76,1385,1279],{"href":1277,"rel":1386},[86],[52,1388,1389,1395],{},[65,1390,1391],{},[76,1392,1394],{"href":1393},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint15-c","INT15-C",[65,1396,1397,1266],{},[76,1398,1265],{"href":1263,"rel":1399},[86],[52,1401,1402,1408],{},[65,1403,1404],{},[76,1405,1407],{"href":1406},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint18-c","INT18-C",[65,1409,1410,1266],{},[76,1411,1265],{"href":1263,"rel":1412},[86],[52,1414,1415,1419],{},[65,1416,1417],{},[76,1418,1407],{"href":1406},[65,1420,1421,1426],{},[76,1422,1425],{"href":1423,"rel":1424},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F190.html",[86],"CWE-190"," , Integer overflow (wrap or wraparound)",[52,1428,1429,1435],{},[65,1430,1431],{},[76,1432,1434],{"href":1433},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem00-c","MEM00-C",[65,1436,1437,1442],{},[76,1438,1441],{"href":1439,"rel":1440},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F415.html",[86],"CWE-415"," , Double free",[52,1444,1445,1449],{},[65,1446,1447],{},[76,1448,1434],{"href":1433},[65,1450,1451,1456],{},[76,1452,1455],{"href":1453,"rel":1454},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F416.html",[86],"CWE-416"," , Use after free",[52,1458,1459,1465],{},[65,1460,1461],{},[76,1462,1464],{"href":1463},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem01-c","MEM01-C",[65,1466,1467,1442],{},[76,1468,1441],{"href":1439,"rel":1469},[86],[52,1471,1472,1476],{},[65,1473,1474],{},[76,1475,1464],{"href":1463},[65,1477,1478,1456],{},[76,1479,1455],{"href":1453,"rel":1480},[86],[52,1482,1483,1489],{},[65,1484,1485],{},[76,1486,1488],{"href":1487},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem03-c","MEM03-C",[65,1490,1491,1496],{},[76,1492,1495],{"href":1493,"rel":1494},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F226.html",[86],"CWE-226"," , Sensitive information uncleared before release",[52,1498,1499,1503],{},[65,1500,1501],{},[76,1502,1488],{"href":1487},[65,1504,1505,1510],{},[76,1506,1509],{"href":1507,"rel":1508},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F244.html",[86],"CWE-244"," , Failure to clear heap memory before release (\"heap inspection\")",[52,1512,1513,1519],{},[65,1514,1515],{},[76,1516,1518],{"href":1517},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem04-c","MEM04-C",[65,1520,1521,1526],{},[76,1522,1525],{"href":1523,"rel":1524},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F687.html",[86],"CWE-687"," , Function call with incorrectly specified argument value",[52,1528,1529,1535],{},[65,1530,1531],{},[76,1532,1534],{"href":1533},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem06-c","MEM06-C",[65,1536,1537,1542],{},[76,1538,1541],{"href":1539,"rel":1540},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F591.html",[86],"CWE-591"," , Sensitive data storage in improperly locked memory",[52,1544,1545,1549],{},[65,1546,1547],{},[76,1548,1534],{"href":1533},[65,1550,1551,1556],{},[76,1552,1555],{"href":1553,"rel":1554},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F528.html",[86],"CWE-528"," , Information leak through core dump files",[52,1558,1559,1565],{},[65,1560,1561],{},[76,1562,1564],{"href":1563},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem07-c","MEM07-C",[65,1566,1567,1426],{},[76,1568,1425],{"href":1423,"rel":1569},[86],[52,1571,1572,1576],{},[65,1573,1574],{},[76,1575,1564],{"href":1563},[65,1577,1578,1583],{},[76,1579,1582],{"href":1580,"rel":1581},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F128.html",[86],"CWE-128"," , Wrap-around error",[52,1585,1586,1592],{},[65,1587,1588],{},[76,1589,1591],{"href":1590},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem10-c","MEM10-C",[65,1593,1594,632],{},[76,1595,631],{"href":629,"rel":1596},[86],[52,1598,1599,1603],{},[65,1600,1601],{},[76,1602,1591],{"href":1590},[65,1604,1605,646],{},[76,1606,645],{"href":643,"rel":1607},[86],[52,1609,1610,1614],{},[65,1611,1612],{},[76,1613,1591],{"href":1590},[65,1615,1616,660],{},[76,1617,659],{"href":657,"rel":1618},[86],[52,1620,1621,1625],{},[65,1622,1623],{},[76,1624,1591],{"href":1590},[65,1626,1627,674],{},[76,1628,673],{"href":671,"rel":1629},[86],[52,1631,1632,1636],{},[65,1633,1634],{},[76,1635,1591],{"href":1590},[65,1637,1638,688],{},[76,1639,687],{"href":685,"rel":1640},[86],[52,1642,1643,1647],{},[65,1644,1645],{},[76,1646,1591],{"href":1590},[65,1648,1649,702],{},[76,1650,701],{"href":699,"rel":1651},[86],[52,1653,1654,1658],{},[65,1655,1656],{},[76,1657,1591],{"href":1590},[65,1659,1660,716],{},[76,1661,715],{"href":713,"rel":1662},[86],[52,1664,1665,1671],{},[65,1666,1667],{},[76,1668,1670],{"href":1669},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem11-c","MEM11-C",[65,1672,1673,1206],{},[76,1674,1205],{"href":1203,"rel":1675},[86],[52,1677,1678,1684],{},[65,1679,1680],{},[76,1681,1683],{"href":1682},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc00-c","MSC00-C",[65,1685,1686,1691],{},[76,1687,1690],{"href":1688,"rel":1689},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F563.html",[86],"CWE-563"," , Unused variable",[52,1693,1694,1698],{},[65,1695,1696],{},[76,1697,1683],{"href":1682},[65,1699,1700,1705],{},[76,1701,1704],{"href":1702,"rel":1703},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F570.html",[86],"CWE-570"," , Expression is always false",[52,1707,1708,1712],{},[65,1709,1710],{},[76,1711,1683],{"href":1682},[65,1713,1714,1719],{},[76,1715,1718],{"href":1716,"rel":1717},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F571.html",[86],"CWE-571"," , Expression is always true",[52,1721,1722,1728],{},[65,1723,1724],{},[76,1725,1727],{"href":1726},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc06-c","MSC06-C",[65,1729,1730,1735],{},[76,1731,1734],{"href":1732,"rel":1733},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F14.html",[86],"CWE-14"," , Compiler removal of code to clear buffers",[52,1737,1738,1744],{},[65,1739,1740],{},[76,1741,1743],{"href":1742},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc07-c","MSC07-C",[65,1745,1746,1751],{},[76,1747,1750],{"href":1748,"rel":1749},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F561.html",[86],"CWE-561"," , Dead code",[52,1753,1754,1760],{},[65,1755,1756],{},[76,1757,1759],{"href":1758},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fuse-subset-of-ascii-for-safety","MSC09-C",[65,1761,1762,1767],{},[76,1763,1766],{"href":1764,"rel":1765},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F116.html",[86],"CWE-116"," , Improper encoding or escaping of output",[52,1769,1770,1776],{},[65,1771,1772],{},[76,1773,1775],{"href":1774},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Futf8-related-issues","MSC10-C",[65,1777,1778,1783],{},[76,1779,1782],{"href":1780,"rel":1781},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F176.html",[86],"CWE-176"," , Failure to handle Unicode encoding",[52,1785,1786,1790],{},[65,1787,1788],{},[76,1789,1775],{"href":1774},[65,1791,1792,1767],{},[76,1793,1766],{"href":1764,"rel":1794},[86],[52,1796,1797,1803],{},[65,1798,1799],{},[76,1800,1802],{"href":1801},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc11-c","MSC11-C",[65,1804,1805,1809],{},[76,1806,1808],{"href":1423,"rel":1807},[86],"CWE-190,"," Reachable assertion",[52,1811,1812,1818],{},[65,1813,1814],{},[76,1815,1817],{"href":1816},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc18-c","MSC18-C",[65,1819,1820,1824],{},[76,1821,103],{"href":1822,"rel":1823},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F259.html",[86]," , Use of Hard-coded Password",[52,1826,1827,1831],{},[65,1828,1829],{},[76,1830,1817],{"href":1816},[65,1832,1833,1838],{},[76,1834,1837],{"href":1835,"rel":1836},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F261.html",[86],"CWE-261"," , Weak Cryptography for Passwords",[52,1840,1841,1845],{},[65,1842,1843],{},[76,1844,1817],{"href":1816},[65,1846,1847,1852],{},[76,1848,1851],{"href":1849,"rel":1850},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F311.html",[86],"CWE-311"," , Missing encryption of sensitive data",[52,1854,1855,1859],{},[65,1856,1857],{},[76,1858,1817],{"href":1816},[65,1860,1861,1866],{},[76,1862,1865],{"href":1863,"rel":1864},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F319.html",[86],"CWE-319"," , Cleartext Transmission of Sensitive Information",[52,1868,1869,1873],{},[65,1870,1871],{},[76,1872,1817],{"href":1816},[65,1874,1875,1880],{},[76,1876,1879],{"href":1877,"rel":1878},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F321.html",[86],"CWE-321"," , Use of Hard-coded Cryptographic Key",[52,1882,1883,1887],{},[65,1884,1885],{},[76,1886,1817],{"href":1816},[65,1888,1889,1894],{},[76,1890,1893],{"href":1891,"rel":1892},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F326.html",[86],"CWE-326"," , Inadequate encryption strength",[52,1896,1897,1901],{},[65,1898,1899],{},[76,1900,1817],{"href":1816},[65,1902,1903,1906],{},[76,1904,117],{"href":115,"rel":1905},[86]," , Use of hard-coded credentials",[52,1908,1909,1915],{},[65,1910,1911],{},[76,1912,1914],{"href":1913},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc24-c","MSC24-C",[65,1916,1917,1921],{},[76,1918,631],{"href":1919,"rel":1920},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F20.html",[86]," , Insufficient input validation",[52,1923,1924,1928],{},[65,1925,1926],{},[76,1927,1914],{"href":1913},[65,1929,1930,867],{},[76,1931,866],{"href":864,"rel":1932},[86],[52,1934,1935,1939],{},[65,1936,1937],{},[76,1938,1914],{"href":1913},[65,1940,1941,646],{},[76,1942,645],{"href":643,"rel":1943},[86],[52,1945,1946,1950],{},[65,1947,1948],{},[76,1949,1914],{"href":1913},[65,1951,1952,660],{},[76,1953,659],{"href":657,"rel":1954},[86],[52,1956,1957,1961],{},[65,1958,1959],{},[76,1960,1914],{"href":1913},[65,1962,1963,674],{},[76,1964,673],{"href":671,"rel":1965},[86],[52,1967,1968,1972],{},[65,1969,1970],{},[76,1971,1914],{"href":1913},[65,1973,1974,688],{},[76,1975,687],{"href":685,"rel":1976},[86],[52,1978,1979,1983],{},[65,1980,1981],{},[76,1982,1914],{"href":1913},[65,1984,1985,702],{},[76,1986,701],{"href":699,"rel":1987},[86],[52,1989,1990,1994],{},[65,1991,1992],{},[76,1993,1914],{"href":1913},[65,1995,1996,2001],{},[76,1997,2000],{"href":1998,"rel":1999},"https:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F120.html",[86],"CWE-120"," , Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')",[52,2003,2004,2008],{},[65,2005,2006],{},[76,2007,1914],{"href":1913},[65,2009,2010,1295],{},[76,2011,148],{"href":1293,"rel":2012},[86],[52,2014,2015,2019],{},[65,2016,2017],{},[76,2018,1914],{"href":1913},[65,2020,2021,1309],{},[76,2022,1308],{"href":1306,"rel":2023},[86],[52,2025,2026,2030],{},[65,2027,2028],{},[76,2029,1914],{"href":1913},[65,2031,2032,881],{},[76,2033,880],{"href":878,"rel":2034},[86],[52,2036,2037,2041],{},[65,2038,2039],{},[76,2040,1914],{"href":1913},[65,2042,2043,2048],{},[76,2044,2047],{"href":2045,"rel":2046},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F464.html",[86],"CWE-464"," , Addition of data structure sentinel",[52,2050,2051,2055],{},[65,2052,2053],{},[76,2054,1914],{"href":1913},[65,2056,2057,716],{},[76,2058,715],{"href":713,"rel":2059},[86],[52,2061,2062,2066],{},[65,2063,2064],{},[76,2065,1914],{"href":1913},[65,2067,2068,730],{},[76,2069,729],{"href":727,"rel":2070},[86],[52,2072,2073,2079],{},[65,2074,2075],{},[76,2076,2078],{"href":2077},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos\u002Fpos01-c","POS01-C",[65,2080,2081,978],{},[76,2082,977],{"href":975,"rel":2083},[86],[52,2085,2086,2090],{},[65,2087,2088],{},[76,2089,2078],{"href":2077},[65,2091,2092,2095],{},[76,2093,367],{"href":365,"rel":2094},[86]," , Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')",[52,2097,2098,2102],{},[65,2099,2100],{},[76,2101,2078],{"href":2077},[65,2103,2104,2107],{},[76,2105,880],{"href":878,"rel":2106},[86]," , Time-of-check, time-of-use (TOCTOU) race condition",[52,2109,2110,2116],{},[65,2111,2112],{},[76,2113,2115],{"href":2114},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos\u002Fpos02-c","POS02-C",[65,2117,2118,2123],{},[76,2119,2122],{"href":2120,"rel":2121},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F250.html",[86],"CWE-250"," , Execution with unnecessary privileges",[52,2125,2126,2130],{},[65,2127,2128],{},[76,2129,2115],{"href":2114},[65,2131,2132,2137],{},[76,2133,2136],{"href":2134,"rel":2135},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F272.html",[86],"CWE-272"," , Least privilege violation",[52,2139,2140,2146],{},[65,2141,2142],{},[76,2143,2145],{"href":2144},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre09-c","PRE09-C",[65,2147,2148,2153],{},[76,2149,2152],{"href":2150,"rel":2151},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F684.html",[86],"CWE-684"," , Failure to provide specified functionality",[52,2155,2156,2162],{},[65,2157,2158],{},[76,2159,2161],{"href":2160},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fsignals-sig\u002Fsig00-c","SIG00-C",[65,2163,2164,2167],{},[76,2165,294],{"href":392,"rel":2166},[86]," , Insufficient synchronization",[52,2169,2170,2176],{},[65,2171,2172],{},[76,2173,2175],{"href":2174},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr02-c","STR02-C",[65,2177,2178,530],{},[76,2179,529],{"href":527,"rel":2180},[86],[52,2182,2183,2187],{},[65,2184,2185],{},[76,2186,2175],{"href":2174},[65,2188,2189,516],{},[76,2190,515],{"href":513,"rel":2191},[86],[52,2193,2194,2200],{},[65,2195,2196],{},[76,2197,2199],{"href":2198},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr03-c","STR03-C",[65,2201,2202,2207],{},[76,2203,2206],{"href":2204,"rel":2205},"http:\u002F\u002Fcwe.mitre.org\u002Fdata\u002Fdefinitions\u002F170.html",[86],"CWE-170"," , Improper null termination",[52,2209,2210,2214],{},[65,2211,2212],{},[76,2213,2199],{"href":2198},[65,2215,2216,2048],{},[76,2217,2047],{"href":2045,"rel":2218},[86],[52,2220,2221,2227],{},[65,2222,2223],{},[76,2224,2226],{"href":2225},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr06-c","STR06-C",[65,2228,2229,2048],{},[76,2230,2047],{"href":2045,"rel":2231},[86],[52,2233,2234,2240],{},[65,2235,2236],{},[76,2237,2239],{"href":2238},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin02-c","WIN02-C",[65,2241,2242,2123],{},[76,2243,2122],{"href":2120,"rel":2244},[86],[52,2246,2247,2251],{},[65,2248,2249],{},[76,2250,2239],{"href":2238},[65,2252,2253,2137],{},[76,2254,2136],{"href":2134,"rel":2255},[86],[52,2257,2258,2264],{},[65,2259,2260],{},[76,2261,2263],{"href":2262},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin04-c","WIN04-C",[65,2265,2266,1852],{},[76,2267,1851],{"href":1849,"rel":2268},[86],[52,2270,2271,2275],{},[65,2272,2273],{},[76,2274,2263],{"href":2262},[65,2276,2277,1866],{},[76,2278,1865],{"href":1863,"rel":2279},[86],{"title":2281,"searchDepth":2282,"depth":2282,"links":2283},"",2,[],"md",{},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe",{"title":30,"description":41},"4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F11.mitre-cwe","iXujE3Jx1k2Jx1FeBz-PPUQN2dxayDwTkKRZcWzNSpk",[2291,2295],{"title":2292,"path":2293,"stem":2294,"children":-1},"2013","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F10.2013","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F10.2013",{"title":2296,"path":2297,"stem":2298,"children":-1},"MITRE CWE 2.11","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe-211","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F12.mitre-cwe-211",[2300],{"title":2301,"path":2302,"stem":2303,"children":2304},"SEI CERT C Coding Standard","\u002Fsei-cert-c-coding-standard","4.sei-cert-c-coding-standard\u002F01.index",[2305,2306,2378,2966,3254,3268,3272,3276,3280,4033],{"title":2301,"path":2302,"stem":2303},{"title":2307,"path":2308,"stem":2309,"children":2310},"Front Matter","\u002Fsei-cert-c-coding-standard\u002Ffront-matter","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F1.index",[2311,2312],{"title":2307,"path":2308,"stem":2309},{"title":2313,"path":2314,"stem":2315,"children":2316},"Introduction","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F01.index",[2317,2318,2322,2326,2330,2334,2338,2342,2346,2350,2354,2358,2362,2366,2370,2374],{"title":2313,"path":2314,"stem":2315},{"title":2319,"path":2320,"stem":2321},"Scope","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fscope","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F01.scope",{"title":2323,"path":2324,"stem":2325},"Audience","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Faudience","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F02.audience",{"title":2327,"path":2328,"stem":2329},"How this Coding Standard is Organized","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fhow-this-coding-standard-is-organized","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F03.how-this-coding-standard-is-organized",{"title":2331,"path":2332,"stem":2333},"History","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fhistory","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F04.history",{"title":2335,"path":2336,"stem":2337},"ISO\u002FIEC TS 17961 C Secure Coding Rules","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fisoiec-ts-17961-c-secure-coding-rules","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F05.isoiec-ts-17961-c-secure-coding-rules",{"title":2339,"path":2340,"stem":2341},"Tool Selection and Validation","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Ftool-selection-and-validation","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F06.tool-selection-and-validation",{"title":2343,"path":2344,"stem":2345},"Taint Analysis","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Ftaint-analysis","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F07.taint-analysis",{"title":2347,"path":2348,"stem":2349},"Rules versus Recommendations","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Frules-versus-recommendations","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F08.rules-versus-recommendations",{"title":2351,"path":2352,"stem":2353},"Conformance Testing","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fconformance-testing","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F09.conformance-testing",{"title":2355,"path":2356,"stem":2357},"Development Process","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fdevelopment-process","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F10.development-process",{"title":2359,"path":2360,"stem":2361},"Usage","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fusage","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F11.usage",{"title":2363,"path":2364,"stem":2365},"System Qualities","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fsystem-qualities","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F12.system-qualities",{"title":2367,"path":2368,"stem":2369},"Automatically Generated Code","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fautomatically-generated-code","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F13.automatically-generated-code",{"title":2371,"path":2372,"stem":2373},"Government Regulations","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Fgovernment-regulations","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F14.government-regulations",{"title":2375,"path":2376,"stem":2377},"Acknowledgments","\u002Fsei-cert-c-coding-standard\u002Ffront-matter\u002Fintroduction\u002Facknowledgments","4.sei-cert-c-coding-standard\u002F02.front-matter\u002F2.introduction\u002F15.acknowledgments",{"title":2379,"path":2380,"stem":2381,"children":2382},"Rules","\u002Fsei-cert-c-coding-standard\u002Frules","4.sei-cert-c-coding-standard\u002F03.rules\u002F01.index",[2383,2384,2388,2418,2447,2509,2547,2573,2595,2661,2687,2745,2779,2809,2819,2856,2926,2944],{"title":2379,"path":2380,"stem":2381},{"title":2385,"path":2386,"stem":2387},"Application Programming Interfaces (API)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fapplication-programming-interfaces-api","4.sei-cert-c-coding-standard\u002F03.rules\u002F02.application-programming-interfaces-api",{"title":2389,"path":2390,"stem":2391,"children":2392},"Arrays (ARR)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F1.index",[2393,2394,2398,2402,2406,2410,2414],{"title":2389,"path":2390,"stem":2391},{"title":2395,"path":2396,"stem":2397},"ARR30-C. Do not form or use out-of-bounds pointers or array subscripts","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F2.arr30-c",{"title":2399,"path":2400,"stem":2401},"ARR32-C. Ensure size arguments for variable length arrays are in a valid range","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F3.arr32-c",{"title":2403,"path":2404,"stem":2405},"ARR36-C. Do not subtract or compare two pointers that do not refer to the same array","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F4.arr36-c",{"title":2407,"path":2408,"stem":2409},"ARR37-C. Do not add or subtract an integer to a pointer to a non-array object","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F5.arr37-c",{"title":2411,"path":2412,"stem":2413},"ARR38-C. Guarantee that library functions do not form invalid pointers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F6.arr38-c",{"title":2415,"path":2416,"stem":2417},"ARR39-C. Do not add or subtract a scaled integer to a pointer","\u002Fsei-cert-c-coding-standard\u002Frules\u002Farrays-arr\u002Farr39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F03.arrays-arr\u002F7.arr39-c",{"title":2419,"path":2420,"stem":2421,"children":2422},"Characters and Strings (STR)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F1.index",[2423,2424,2428,2432,2436,2439,2443],{"title":2419,"path":2420,"stem":2421},{"title":2425,"path":2426,"stem":2427},"STR30-C. Do not attempt to modify string literals","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F2.str30-c",{"title":2429,"path":2430,"stem":2431},"STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F3.str31-c",{"title":2433,"path":2434,"stem":2435},"STR32-C. Do not pass a non-null-terminated character sequence to a library function that expects a string","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F4.str32-c",{"title":2437,"path":78,"stem":2438},"STR34-C. Cast characters to unsigned char before converting to larger integer sizes","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F5.str34-c",{"title":2440,"path":2441,"stem":2442},"STR37-C. Arguments to character-handling functions must be representable as an unsigned char","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F6.str37-c",{"title":2444,"path":2445,"stem":2446},"STR38-C. Do not confuse narrow and wide character strings and functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fcharacters-and-strings-str\u002Fstr38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F04.characters-and-strings-str\u002F7.str38-c",{"title":2448,"path":2449,"stem":2450,"children":2451},"Concurrency (CON)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F01.index",[2452,2453,2457,2461,2465,2469,2473,2477,2481,2485,2489,2493,2497,2501,2505],{"title":2448,"path":2449,"stem":2450},{"title":2454,"path":2455,"stem":2456},"CON30-C. Clean up thread-specific storage","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F02.con30-c",{"title":2458,"path":2459,"stem":2460},"CON31-C. Do not destroy a mutex while it is locked","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F03.con31-c",{"title":2462,"path":2463,"stem":2464},"CON32-C. Prevent data races when accessing bit-fields from multiple threads","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F04.con32-c",{"title":2466,"path":2467,"stem":2468},"CON33-C. Avoid race conditions when using library functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F05.con33-c",{"title":2470,"path":2471,"stem":2472},"CON34-C. Declare objects shared between threads with appropriate storage durations","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F06.con34-c",{"title":2474,"path":2475,"stem":2476},"CON35-C. Avoid deadlock by locking in a predefined order","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F07.con35-c",{"title":2478,"path":2479,"stem":2480},"CON36-C. Wrap functions that can spuriously wake up in a loop","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F08.con36-c",{"title":2482,"path":2483,"stem":2484},"CON37-C. Do not call signal() in a multithreaded program","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F09.con37-c",{"title":2486,"path":2487,"stem":2488},"CON38-C. Preserve thread safety and liveness when using condition variables","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F10.con38-c",{"title":2490,"path":2491,"stem":2492},"CON39-C. Do not join or detach a thread that was previously joined or detached","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F11.con39-c",{"title":2494,"path":2495,"stem":2496},"CON40-C. Do not refer to an atomic variable twice in an expression","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F12.con40-c",{"title":2498,"path":2499,"stem":2500},"CON41-C. Wrap functions that can fail spuriously in a loop","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon41-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F13.con41-c",{"title":2502,"path":2503,"stem":2504},"CON42-C. Don't allow attackers to influence environment variables that control concurrency parameters","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon42-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F14.con42-c",{"title":2506,"path":2507,"stem":2508},"CON43-C. Do not allow data races in multithreaded code","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fconcurrency-con\u002Fcon43-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F05.concurrency-con\u002F15.con43-c",{"title":2510,"path":2511,"stem":2512,"children":2513},"Declarations and Initialization (DCL)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F1.index",[2514,2515,2519,2523,2527,2531,2535,2539,2543],{"title":2510,"path":2511,"stem":2512},{"title":2516,"path":2517,"stem":2518},"DCL30-C. Declare objects with appropriate storage durations","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F2.dcl30-c",{"title":2520,"path":2521,"stem":2522},"DCL31-C. Declare identifiers before using them","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F3.dcl31-c",{"title":2524,"path":2525,"stem":2526},"DCL36-C. Do not declare an identifier with conflicting linkage classifications","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F4.dcl36-c",{"title":2528,"path":2529,"stem":2530},"DCL37-C. Do not declare or define a reserved identifier","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F5.dcl37-c",{"title":2532,"path":2533,"stem":2534},"DCL38-C. Use the correct syntax when declaring a flexible array member","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F6.dcl38-c",{"title":2536,"path":2537,"stem":2538},"DCL39-C. Avoid information leakage when passing a structure across a trust boundary","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F7.dcl39-c",{"title":2540,"path":2541,"stem":2542},"DCL40-C. Do not create incompatible declarations of the same function or object","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F8.dcl40-c",{"title":2544,"path":2545,"stem":2546},"DCL41-C. Do not declare variables inside a switch statement before the first case label","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fdeclarations-and-initialization-dcl\u002Fdcl41-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F06.declarations-and-initialization-dcl\u002F9.dcl41-c",{"title":2548,"path":2549,"stem":2550,"children":2551},"Environment (ENV)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F1.index",[2552,2553,2557,2561,2565,2569],{"title":2548,"path":2549,"stem":2550},{"title":2554,"path":2555,"stem":2556},"ENV30-C. Do not modify the object referenced by the return value of certain functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F2.env30-c",{"title":2558,"path":2559,"stem":2560},"ENV31-C. Do not rely on an environment pointer following an operation that may invalidate it","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F3.env31-c",{"title":2562,"path":2563,"stem":2564},"ENV32-C. All exit handlers must return normally","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F4.env32-c",{"title":2566,"path":2567,"stem":2568},"ENV33-C. Do not call system()","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F5.env33-c",{"title":2570,"path":2571,"stem":2572},"ENV34-C. Do not store pointers returned by certain functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fenvironment-env\u002Fenv34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F07.environment-env\u002F6.env34-c",{"title":2574,"path":2575,"stem":2576,"children":2577},"Error Handling (ERR)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F1.index",[2578,2579,2583,2587,2591],{"title":2574,"path":2575,"stem":2576},{"title":2580,"path":2581,"stem":2582},"ERR30-C. Take care when reading errno","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err\u002Ferr30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F2.err30-c",{"title":2584,"path":2585,"stem":2586},"ERR32-C. Do not rely on indeterminate values of errno","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err\u002Ferr32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F3.err32-c",{"title":2588,"path":2589,"stem":2590},"ERR33-C. Detect and handle standard library errors","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err\u002Ferr33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F4.err33-c",{"title":2592,"path":2593,"stem":2594},"ERR34-C. Detect errors when converting a string to a number","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ferror-handling-err\u002Ferr34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F08.error-handling-err\u002F5.err34-c",{"title":2596,"path":2597,"stem":2598,"children":2599},"Expressions (EXP)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F01.index",[2600,2601,2605,2609,2613,2617,2621,2625,2629,2633,2637,2641,2645,2649,2653,2657],{"title":2596,"path":2597,"stem":2598},{"title":2602,"path":2603,"stem":2604},"EXP30-C. Do not depend on the order of evaluation for side effects","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F02.exp30-c",{"title":2606,"path":2607,"stem":2608},"EXP32-C. Do not access a volatile object through a nonvolatile reference","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F03.exp32-c",{"title":2610,"path":2611,"stem":2612},"EXP33-C. Do not read uninitialized memory","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F04.exp33-c",{"title":2614,"path":2615,"stem":2616},"EXP34-C. Do not dereference null pointers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F05.exp34-c",{"title":2618,"path":2619,"stem":2620},"EXP35-C. Do not modify objects with temporary lifetime","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F06.exp35-c",{"title":2622,"path":2623,"stem":2624},"EXP36-C. Do not cast pointers into more strictly aligned pointer types","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F07.exp36-c",{"title":2626,"path":2627,"stem":2628},"EXP37-C. Call functions with the correct number and type of arguments","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F08.exp37-c",{"title":2630,"path":2631,"stem":2632},"EXP39-C. Do not access a variable through a pointer of an incompatible type","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F09.exp39-c",{"title":2634,"path":2635,"stem":2636},"EXP40-C. Do not modify constant objects","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F10.exp40-c",{"title":2638,"path":2639,"stem":2640},"EXP42-C. Do not compare padding data","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp42-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F11.exp42-c",{"title":2642,"path":2643,"stem":2644},"EXP43-C. Avoid undefined behavior when using restrict-qualified pointers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp43-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F12.exp43-c",{"title":2646,"path":2647,"stem":2648},"EXP44-C. Do not rely on side effects in operands to sizeof, _Alignof, or _Generic","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp44-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F13.exp44-c",{"title":2650,"path":2651,"stem":2652},"EXP45-C. Do not perform assignments in selection statements","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp45-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F14.exp45-c",{"title":2654,"path":2655,"stem":2656},"EXP46-C. Do not use a bitwise operator with a Boolean-like operand","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp46-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F15.exp46-c",{"title":2658,"path":2659,"stem":2660},"EXP47-C. Do not call va_arg with an argument of the incorrect type","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fexpressions-exp\u002Fexp47-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F09.expressions-exp\u002F16.exp47-c",{"title":2662,"path":2663,"stem":2664,"children":2665},"Floating Point (FLP)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F1.index",[2666,2667,2671,2675,2679,2683],{"title":2662,"path":2663,"stem":2664},{"title":2668,"path":2669,"stem":2670},"FLP30-C. Do not use floating-point variables as loop counters","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F2.flp30-c",{"title":2672,"path":2673,"stem":2674},"FLP32-C. Prevent or detect domain and range errors in math functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F3.flp32-c",{"title":2676,"path":2677,"stem":2678},"FLP34-C. Ensure that floating-point conversions are within range of the new type","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F4.flp34-c",{"title":2680,"path":2681,"stem":2682},"FLP36-C. Preserve precision when converting integral values to floating-point type","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F5.flp36-c",{"title":2684,"path":2685,"stem":2686},"FLP37-C. Do not use object representations to compare floating-point values","\u002Fsei-cert-c-coding-standard\u002Frules\u002Ffloating-point-flp\u002Fflp37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F10.floating-point-flp\u002F6.flp37-c",{"title":2688,"path":2689,"stem":2690,"children":2691},"Input Output (FIO)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F01.index",[2692,2693,2697,2701,2705,2709,2713,2717,2721,2725,2729,2733,2737,2741],{"title":2688,"path":2689,"stem":2690},{"title":2694,"path":2695,"stem":2696},"FIO30-C. Exclude user input from format strings","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F02.fio30-c",{"title":2698,"path":2699,"stem":2700},"FIO32-C. Do not perform operations on devices that are only appropriate for files","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F03.fio32-c",{"title":2702,"path":2703,"stem":2704},"FIO34-C. Distinguish between characters read from a file and EOF or WEOF","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F04.fio34-c",{"title":2706,"path":2707,"stem":2708},"FIO37-C. Do not assume that fgets() or fgetws() returns a nonempty string when successful","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F05.fio37-c",{"title":2710,"path":2711,"stem":2712},"FIO38-C. Do not copy a FILE object","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F06.fio38-c",{"title":2714,"path":2715,"stem":2716},"FIO39-C. Do not alternately input and output from a stream without an intervening flush or positioning call","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F07.fio39-c",{"title":2718,"path":2719,"stem":2720},"FIO40-C. Reset strings on fgets() or fgetws() failure","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F08.fio40-c",{"title":2722,"path":2723,"stem":2724},"FIO41-C. Do not call getc(), putc(), getwc(), or putwc() with a stream argument that has side effects","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio41-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F09.fio41-c",{"title":2726,"path":2727,"stem":2728},"FIO42-C. Close files when they are no longer needed","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio42-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F10.fio42-c",{"title":2730,"path":2731,"stem":2732},"FIO44-C. Only use values for fsetpos() that are returned from fgetpos()","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio44-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F11.fio44-c",{"title":2734,"path":2735,"stem":2736},"FIO45-C. Avoid TOCTOU race conditions while accessing files","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio45-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F12.fio45-c",{"title":2738,"path":2739,"stem":2740},"FIO46-C. Do not access a closed file","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio46-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F13.fio46-c",{"title":2742,"path":2743,"stem":2744},"FIO47-C. Use valid format strings","\u002Fsei-cert-c-coding-standard\u002Frules\u002Finput-output-fio\u002Ffio47-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F11.input-output-fio\u002F14.fio47-c",{"title":2746,"path":2747,"stem":2748,"children":2749},"Integers (INT)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F1.index",[2750,2751,2755,2759,2763,2767,2771,2775],{"title":2746,"path":2747,"stem":2748},{"title":2752,"path":2753,"stem":2754},"INT30-C. Ensure that unsigned integer operations do not wrap","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F2.int30-c",{"title":2756,"path":2757,"stem":2758},"INT31-C. Ensure that integer conversions do not result in lost or misinterpreted data","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F3.int31-c",{"title":2760,"path":2761,"stem":2762},"INT32-C. Ensure that operations on signed integers do not result in overflow","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F4.int32-c",{"title":2764,"path":2765,"stem":2766},"INT33-C. Ensure that division and remainder operations do not result in divide-by-zero errors","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F5.int33-c",{"title":2768,"path":2769,"stem":2770},"INT34-C. Do not shift an expression by a negative number of bits or by greater than or equal to the number of bits that exist in the operand","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F6.int34-c",{"title":2772,"path":2773,"stem":2774},"INT35-C. Use correct integer precisions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F7.int35-c",{"title":2776,"path":2777,"stem":2778},"INT36-C. Converting a pointer to integer or integer to pointer","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fintegers-int\u002Fint36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F12.integers-int\u002F8.int36-c",{"title":2780,"path":2781,"stem":2782,"children":2783},"Memory Management (MEM)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F1.index",[2784,2785,2789,2793,2797,2801,2805],{"title":2780,"path":2781,"stem":2782},{"title":2786,"path":2787,"stem":2788},"MEM30-C. Do not access freed memory","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F2.mem30-c",{"title":2790,"path":2791,"stem":2792},"MEM31-C. Free dynamically allocated memory when no longer needed","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F3.mem31-c",{"title":2794,"path":2795,"stem":2796},"MEM33-C. Allocate and copy structures containing a flexible array member dynamically","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F4.mem33-c",{"title":2798,"path":2799,"stem":2800},"MEM34-C. Only free memory allocated dynamically","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F5.mem34-c",{"title":2802,"path":2803,"stem":2804},"MEM35-C. Allocate sufficient memory for an object","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F6.mem35-c",{"title":2806,"path":2807,"stem":2808},"MEM36-C. Do not modify the alignment of objects by calling realloc()","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmemory-management-mem\u002Fmem36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F13.memory-management-mem\u002F7.mem36-c",{"title":2810,"path":2811,"stem":2812,"children":2813},"Microsoft Windows (WIN)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmicrosoft-windows-win","4.sei-cert-c-coding-standard\u002F03.rules\u002F14.microsoft-windows-win\u002F1.index",[2814,2815],{"title":2810,"path":2811,"stem":2812},{"title":2816,"path":2817,"stem":2818},"WIN30-C. Properly pair allocation and deallocation functions","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmicrosoft-windows-win\u002Fwin30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F14.microsoft-windows-win\u002F2.win30-c",{"title":2820,"path":2821,"stem":2822,"children":2823},"Miscellaneous (MSC)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F1.index",[2824,2825,2829,2833,2837,2841,2845,2849,2853],{"title":2820,"path":2821,"stem":2822},{"title":2826,"path":2827,"stem":2828},"MSC30-C. Do not use the rand() function for generating pseudorandom numbers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F2.msc30-c",{"title":2830,"path":2831,"stem":2832},"MSC32-C. Properly seed pseudorandom number generators","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F3.msc32-c",{"title":2834,"path":2835,"stem":2836},"MSC33-C. Do not pass invalid data to the asctime() function","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc33-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F4.msc33-c",{"title":2838,"path":2839,"stem":2840},"MSC37-C. Ensure that control never reaches the end of a non-void function","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F5.msc37-c",{"title":2842,"path":2843,"stem":2844},"MSC38-C. Do not treat a predefined identifier as an object if it might only be implemented as a macro","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F6.msc38-c",{"title":2846,"path":2847,"stem":2848},"MSC39-C. Do not call va_arg() on a va_list that has an indeterminate value","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F7.msc39-c",{"title":2850,"path":2851,"stem":2852},"MSC40-C. Do not violate constraints","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fmiscellaneous-msc\u002Fmsc40-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F8.msc40-c",{"title":2854,"path":95,"stem":2855},"MSC41-C. Never hard code sensitive information","4.sei-cert-c-coding-standard\u002F03.rules\u002F15.miscellaneous-msc\u002F9.msc41-c",{"title":2857,"path":2858,"stem":2859,"children":2860},"POSIX (POS)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F01.index",[2861,2862,2866,2870,2874,2878,2882,2886,2890,2894,2898,2902,2906,2910,2914,2918,2922],{"title":2857,"path":2858,"stem":2859},{"title":2863,"path":2864,"stem":2865},"POS30-C. Use the readlink() function properly","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F02.pos30-c",{"title":2867,"path":2868,"stem":2869},"POS34-C. Do not call putenv() with a pointer to an automatic variable as the argument","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F03.pos34-c",{"title":2871,"path":2872,"stem":2873},"POS35-C. Avoid race conditions while checking for the existence of a symbolic link","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F04.pos35-c",{"title":2875,"path":2876,"stem":2877},"POS36-C. Observe correct revocation order while relinquishing privileges","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos36-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F05.pos36-c",{"title":2879,"path":2880,"stem":2881},"POS37-C. Ensure that privilege relinquishment is successful","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos37-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F06.pos37-c",{"title":2883,"path":2884,"stem":2885},"POS38-C. Beware of race conditions when using fork and file descriptors","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos38-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F07.pos38-c",{"title":2887,"path":2888,"stem":2889},"POS39-C. Use the correct byte ordering when transferring data between systems","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos39-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F08.pos39-c",{"title":2891,"path":2892,"stem":2893},"POS44-C. Do not use signals to terminate threads","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos44-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F09.pos44-c",{"title":2895,"path":2896,"stem":2897},"POS47-C. Do not use threads that can be canceled asynchronously","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos47-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F10.pos47-c",{"title":2899,"path":2900,"stem":2901},"POS48-C. Do not unlock or destroy another POSIX thread's mutex","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos48-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F11.pos48-c",{"title":2903,"path":2904,"stem":2905},"POS49-C. When data must be accessed by multiple threads, provide a mutex and guarantee no adjacent data is also accessed","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos49-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F12.pos49-c",{"title":2907,"path":2908,"stem":2909},"POS50-C. Declare objects shared between POSIX threads with appropriate storage durations","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos50-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F13.pos50-c",{"title":2911,"path":2912,"stem":2913},"POS51-C. Avoid deadlock with POSIX threads by locking in predefined order","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos51-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F14.pos51-c",{"title":2915,"path":2916,"stem":2917},"POS52-C. Do not perform operations that can block while holding a POSIX lock","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos52-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F15.pos52-c",{"title":2919,"path":2920,"stem":2921},"POS53-C. Do not use more than one mutex for concurrent waiting operations on a condition variable","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos53-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F16.pos53-c",{"title":2923,"path":2924,"stem":2925},"POS54-C. Detect and handle POSIX library errors","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fposix-pos\u002Fpos54-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F16.posix-pos\u002F17.pos54-c",{"title":2927,"path":2928,"stem":2929,"children":2930},"Preprocessor (PRE)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fpreprocessor-pre","4.sei-cert-c-coding-standard\u002F03.rules\u002F17.preprocessor-pre\u002F1.index",[2931,2932,2936,2940],{"title":2927,"path":2928,"stem":2929},{"title":2933,"path":2934,"stem":2935},"PRE30-C. Do not create a universal character name through concatenation","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fpreprocessor-pre\u002Fpre30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F17.preprocessor-pre\u002F2.pre30-c",{"title":2937,"path":2938,"stem":2939},"PRE31-C. Avoid side effects in arguments to unsafe macros","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fpreprocessor-pre\u002Fpre31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F17.preprocessor-pre\u002F3.pre31-c",{"title":2941,"path":2942,"stem":2943},"PRE32-C. Do not use preprocessor directives in invocations of function-like macros","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fpreprocessor-pre\u002Fpre32-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F17.preprocessor-pre\u002F4.pre32-c",{"title":2945,"path":2946,"stem":2947,"children":2948},"Signals (SIG)","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F1.index",[2949,2950,2954,2958,2962],{"title":2945,"path":2946,"stem":2947},{"title":2951,"path":2952,"stem":2953},"SIG30-C. Call only asynchronous-safe functions within signal handlers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig\u002Fsig30-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F2.sig30-c",{"title":2955,"path":2956,"stem":2957},"SIG31-C. Do not access shared objects in signal handlers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig\u002Fsig31-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F3.sig31-c",{"title":2959,"path":2960,"stem":2961},"SIG34-C. Do not call signal() from within interruptible signal handlers","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig\u002Fsig34-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F4.sig34-c",{"title":2963,"path":2964,"stem":2965},"SIG35-C. Do not return from a computational exception signal handler","\u002Fsei-cert-c-coding-standard\u002Frules\u002Fsignals-sig\u002Fsig35-c","4.sei-cert-c-coding-standard\u002F03.rules\u002F18.signals-sig\u002F5.sig35-c",{"title":2967,"path":2968,"stem":2969,"children":2970},"Back Matter","\u002Fsei-cert-c-coding-standard\u002Fback-matter","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F1.index",[2971,2972,2976,2980,2984,2988,3202,3250],{"title":2967,"path":2968,"stem":2969},{"title":2973,"path":2974,"stem":2975},"AA. Bibliography","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Faa-bibliography","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F2.aa-bibliography",{"title":2977,"path":2978,"stem":2979},"BB. Definitions","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fbb-definitions","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F3.bb-definitions",{"title":2981,"path":2982,"stem":2983},"CC. Undefined Behavior","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fcc-undefined-behavior","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F4.cc-undefined-behavior",{"title":2985,"path":2986,"stem":2987},"DD. Unspecified Behavior","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fdd-unspecified-behavior","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F5.dd-unspecified-behavior",{"title":2989,"path":2990,"stem":2991,"children":2992},"EE. Analyzers","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F01.index",[2993,2994,2998,3002,3006,3010,3014,3018,3022,3026,3030,3034,3038,3042,3046,3050,3054,3058,3062,3066,3070,3074,3078,3082,3086,3090,3094,3098,3102,3106,3110,3114,3118,3122,3126,3130,3134,3138,3142,3146,3150,3154,3158,3162,3166,3170,3174,3178,3182,3186,3190,3194,3198],{"title":2989,"path":2990,"stem":2991},{"title":2995,"path":2996,"stem":2997},"Astrée","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fastree","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F02.astree",{"title":2999,"path":3000,"stem":3001},"Astrée_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fastree_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F03.astree_v",{"title":3003,"path":3004,"stem":3005},"Axivion Bauhaus Suite","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Faxivion-bauhaus-suite","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F04.axivion-bauhaus-suite",{"title":3007,"path":3008,"stem":3009},"Axivion Bauhaus Suite_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Faxivion-bauhaus-suite_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F05.axivion-bauhaus-suite_v",{"title":3011,"path":3012,"stem":3013},"Clang","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F06.clang",{"title":3015,"path":3016,"stem":3017},"Clang_38_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang_38_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F07.clang_38_v",{"title":3019,"path":3020,"stem":3021},"Clang_39_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang_39_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F08.clang_39_v",{"title":3023,"path":3024,"stem":3025},"Clang_40_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang_40_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F09.clang_40_v",{"title":3027,"path":3028,"stem":3029},"Clang_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fclang_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F10.clang_v",{"title":3031,"path":3032,"stem":3033},"Codee","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcodee","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F11.codee",{"title":3035,"path":3036,"stem":3037},"Codee_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcodee_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F12.codee_v",{"title":3039,"path":3040,"stem":3041},"CodeSonar","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcodesonar","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F13.codesonar",{"title":3043,"path":3044,"stem":3045},"CodeSonar_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcodesonar_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F14.codesonar_v",{"title":3047,"path":3048,"stem":3049},"Coverity","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcoverity","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F15.coverity",{"title":3051,"path":3052,"stem":3053},"Coverity_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcoverity_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F16.coverity_v",{"title":3055,"path":3056,"stem":3057},"Cppcheck","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcppcheck","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F17.cppcheck",{"title":3059,"path":3060,"stem":3061},"Cppcheck Premium","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcppcheck-premium","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F18.cppcheck-premium",{"title":3063,"path":3064,"stem":3065},"Cppcheck Premium_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcppcheck-premium_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F19.cppcheck-premium_v",{"title":3067,"path":3068,"stem":3069},"Cppcheck_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fcppcheck_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F20.cppcheck_v",{"title":3071,"path":3072,"stem":3073},"ECLAIR","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Feclair","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F21.eclair",{"title":3075,"path":3076,"stem":3077},"ECLAIR_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Feclair_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F22.eclair_v",{"title":3079,"path":3080,"stem":3081},"EDG","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fedg","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F23.edg",{"title":3083,"path":3084,"stem":3085},"EDG_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fedg_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F24.edg_v",{"title":3087,"path":3088,"stem":3089},"GCC","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fgcc","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F25.gcc",{"title":3091,"path":3092,"stem":3093},"GCC_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fgcc_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F26.gcc_v",{"title":3095,"path":3096,"stem":3097},"Helix QAC","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fhelix-qac","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F27.helix-qac",{"title":3099,"path":3100,"stem":3101},"Helix QAC_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fhelix-qac_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F28.helix-qac_v",{"title":3103,"path":3104,"stem":3105},"Klocwork","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fklocwork","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F29.klocwork",{"title":3107,"path":3108,"stem":3109},"Klocwork_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fklocwork_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F30.klocwork_v",{"title":3111,"path":3112,"stem":3113},"LDRA","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fldra","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F31.ldra",{"title":3115,"path":3116,"stem":3117},"LDRA_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fldra_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F32.ldra_v",{"title":3119,"path":3120,"stem":3121},"Parasoft","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fparasoft","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F33.parasoft",{"title":3123,"path":3124,"stem":3125},"Parasoft_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fparasoft_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F34.parasoft_v",{"title":3127,"path":3128,"stem":3129},"PC-lint Plus","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpc-lint-plus","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F35.pc-lint-plus",{"title":3131,"path":3132,"stem":3133},"PC-lint Plus_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpc-lint-plus_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F36.pc-lint-plus_v",{"title":3135,"path":3136,"stem":3137},"Polyspace Bug Finder","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpolyspace-bug-finder","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F37.polyspace-bug-finder",{"title":3139,"path":3140,"stem":3141},"Polyspace Bug Finder_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpolyspace-bug-finder_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F38.polyspace-bug-finder_v",{"title":3143,"path":3144,"stem":3145},"PVS-Studio","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpvs-studio","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F39.pvs-studio",{"title":3147,"path":3148,"stem":3149},"PVS-Studio_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fpvs-studio_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F40.pvs-studio_v",{"title":3151,"path":3152,"stem":3153},"Rose","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frose","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F41.rose",{"title":3155,"path":3156,"stem":3157},"Rose_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frose_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F42.rose_v",{"title":3159,"path":3160,"stem":3161},"Rosecheckers Code","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frosecheckers-code","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F43.rosecheckers-code",{"title":3163,"path":3164,"stem":3165},"RuleChecker","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frulechecker","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F44.rulechecker",{"title":3167,"path":3168,"stem":3169},"RuleChecker_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Frulechecker_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F45.rulechecker_v",{"title":3171,"path":3172,"stem":3173},"Security Reviewer - Static Reviewer","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsecurity-reviewer-static-reviewer","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F46.security-reviewer-static-reviewer",{"title":3175,"path":3176,"stem":3177},"Security Reviewer - Static Reviewer_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsecurity-reviewer-static-reviewer_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F47.security-reviewer-static-reviewer_v",{"title":3179,"path":3180,"stem":3181},"SonarQube C\u002FC++ Plugin","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsonarqube-ccpp-plugin","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F48.sonarqube-ccpp-plugin",{"title":3183,"path":3184,"stem":3185},"SonarQube C\u002FC++ Plugin_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsonarqube-ccpp-plugin_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F49.sonarqube-ccpp-plugin_v",{"title":3187,"path":3188,"stem":3189},"Splint","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsplint","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F50.splint",{"title":3191,"path":3192,"stem":3193},"Splint_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Fsplint_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F51.splint_v",{"title":3195,"path":3196,"stem":3197},"TrustInSoft Analyzer","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Ftrustinsoft-analyzer","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F52.trustinsoft-analyzer",{"title":3199,"path":3200,"stem":3201},"TrustInSoft Analyzer_V","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fee-analyzers\u002Ftrustinsoft-analyzer_v","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F6.ee-analyzers\u002F53.trustinsoft-analyzer_v",{"title":3203,"path":3204,"stem":3205,"children":3206},"FF. Related Guidelines","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F01.index",[3207,3208,3212,3216,3220,3224,3228,3232,3236,3239,3240,3241,3242,3246],{"title":3203,"path":3204,"stem":3205},{"title":3209,"path":3210,"stem":3211},"2003","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F02.2003","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F02.2003",{"title":3213,"path":3214,"stem":3215},"2006","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F03.2006","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F03.2006",{"title":3217,"path":3218,"stem":3219},"2007","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F04.2007","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F04.2007",{"title":3221,"path":3222,"stem":3223},"2008","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F05.2008","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F05.2008",{"title":3225,"path":3226,"stem":3227},"2010","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F06.2010","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F06.2010",{"title":3229,"path":3230,"stem":3231},"2011","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F07.2011","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F07.2011",{"title":3233,"path":3234,"stem":3235},"2012","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F08.2012","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F08.2012",{"title":2292,"path":3237,"stem":3238},"\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002F09.2013","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F09.2013",{"title":2292,"path":2293,"stem":2294},{"title":30,"path":2286,"stem":2288},{"title":2296,"path":2297,"stem":2298},{"title":3243,"path":3244,"stem":3245},"MITRE CWE 3.1","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe-31","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F13.mitre-cwe-31",{"title":3247,"path":3248,"stem":3249},"MITRE CWE 3.11","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fff-related-guidelines\u002Fmitre-cwe-311","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F7.ff-related-guidelines\u002F14.mitre-cwe-311",{"title":3251,"path":3252,"stem":3253},"GG. Risk Assessments","\u002Fsei-cert-c-coding-standard\u002Fback-matter\u002Fgg-risk-assessments","4.sei-cert-c-coding-standard\u002F04.back-matter\u002F8.gg-risk-assessments",{"title":3255,"path":3256,"stem":3257,"children":3258},"Admin","\u002Fsei-cert-c-coding-standard\u002Fadmin","4.sei-cert-c-coding-standard\u002F05.admin\u002F1.index",[3259,3260,3264],{"title":3255,"path":3256,"stem":3257},{"title":3261,"path":3262,"stem":3263},"TODO List","\u002Fsei-cert-c-coding-standard\u002Fadmin\u002Ftodo-list","4.sei-cert-c-coding-standard\u002F05.admin\u002F2.todo-list",{"title":3265,"path":3266,"stem":3267},"Undefined and implementation-defined behaviors not deemed ruleworthy","\u002Fsei-cert-c-coding-standard\u002Fadmin\u002Fundefined-and-implementation-defined-behaviors-not-deemed-ruleworthy","4.sei-cert-c-coding-standard\u002F05.admin\u002F3.undefined-and-implementation-defined-behaviors-not-deemed-ruleworthy",{"title":3269,"path":3270,"stem":3271},"Coding Style Guidelines","\u002Fsei-cert-c-coding-standard\u002Fcoding-style-guidelines","4.sei-cert-c-coding-standard\u002F05.coding-style-guidelines",{"title":3273,"path":3274,"stem":3275},"Errata for SEI CERT C Coding Standard (2016 Edition)","\u002Fsei-cert-c-coding-standard\u002Ferrata-for-sei-cert-c-coding-standard-2016-edition","4.sei-cert-c-coding-standard\u002F06.errata-for-sei-cert-c-coding-standard-2016-edition",{"title":3277,"path":3278,"stem":3279},"Wiki Contents","\u002Fsei-cert-c-coding-standard\u002Fwiki-contents","4.sei-cert-c-coding-standard\u002F06.wiki-contents",{"title":3281,"path":3282,"stem":3283,"children":3284},"Recommendations","\u002Fsei-cert-c-coding-standard\u002Frecommendations","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F01.index",[3285,3286,3325,3341,3383,3421,3516,3530,3560,3622,3657,3734,3793,3834,3857,3942,3961,4017],{"title":3281,"path":3282,"stem":3283},{"title":2385,"path":3287,"stem":3288,"children":3289},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F01.index",[3290,3291,3294,3298,3302,3306,3310,3314,3317,3321],{"title":2385,"path":3287,"stem":3288},{"title":3292,"path":125,"stem":3293},"API00-C. Functions should validate their parameters","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F02.api00-c",{"title":3295,"path":3296,"stem":3297},"API01-C. Avoid laying out strings in memory directly before sensitive data","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F03.api01-c",{"title":3299,"path":3300,"stem":3301},"API02-C. Functions that read or write to or from an array should take an argument to specify the source or target size","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F04.api02-c",{"title":3303,"path":3304,"stem":3305},"API03-C. Create consistent interfaces and capabilities across related functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F05.api03-c",{"title":3307,"path":3308,"stem":3309},"API04-C. Provide a consistent and usable error-checking mechanism","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F06.api04-c",{"title":3311,"path":3312,"stem":3313},"API05-C. Use conformant array parameters","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F07.api05-c",{"title":3315,"path":140,"stem":3316},"API07-C. Enforce type safety","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F08.api07-c",{"title":3318,"path":3319,"stem":3320},"API09-C. Compatible values should have the same type","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F09.api09-c",{"title":3322,"path":3323,"stem":3324},"API10-C. APIs should have security options enabled by default","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fapplication-programming-interfaces-api\u002Fapi10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F02.application-programming-interfaces-api\u002F10.api10-c",{"title":2389,"path":3326,"stem":3327,"children":3328},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Farrays-arr","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F03.arrays-arr\u002F1.index",[3329,3330,3334,3337],{"title":2389,"path":3326,"stem":3327},{"title":3331,"path":3332,"stem":3333},"ARR00-C. Understand how arrays work","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Farrays-arr\u002Farr00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F03.arrays-arr\u002F2.arr00-c",{"title":3335,"path":245,"stem":3336},"ARR01-C. Do not apply the sizeof operator to a pointer when taking the size of an array","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F03.arrays-arr\u002F3.arr01-c",{"title":3338,"path":3339,"stem":3340},"ARR02-C. Explicitly specify array bounds, even if implicitly defined by an initializer","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Farrays-arr\u002Farr02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F03.arrays-arr\u002F4.arr02-c",{"title":2419,"path":3342,"stem":3343,"children":3344},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F01.index",[3345,3346,3350,3354,3357,3360,3364,3368,3371,3375,3379],{"title":2419,"path":3342,"stem":3343},{"title":3347,"path":3348,"stem":3349},"STR00-C. Represent characters using an appropriate type","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F02.str00-c",{"title":3351,"path":3352,"stem":3353},"STR01-C. Adopt and implement a consistent plan for managing strings","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F03.str01-c",{"title":3355,"path":2174,"stem":3356},"STR02-C. Sanitize data passed to complex subsystems","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F04.str02-c",{"title":3358,"path":2198,"stem":3359},"STR03-C. Do not inadvertently truncate a string","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F05.str03-c",{"title":3361,"path":3362,"stem":3363},"STR04-C. Use plain char for characters in the basic character set","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F06.str04-c",{"title":3365,"path":3366,"stem":3367},"STR05-C. Use pointers to const when referring to string literals","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F07.str05-c",{"title":3369,"path":2225,"stem":3370},"STR06-C. Do not assume that strtok() leaves the parse string unchanged","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F08.str06-c",{"title":3372,"path":3373,"stem":3374},"STR09-C. Don't assume numeric values for expressions with type plain character","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F09.str09-c",{"title":3376,"path":3377,"stem":3378},"STR10-C. Do not concatenate different type of string literals","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F10.str10-c",{"title":3380,"path":3381,"stem":3382},"STR11-C. Do not specify the bound of a character array initialized with a string literal","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fcharacters-and-strings-str\u002Fstr11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F04.characters-and-strings-str\u002F11.str11-c",{"title":2448,"path":3384,"stem":3385,"children":3386},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F01.index",[3387,3388,3392,3396,3400,3404,3407,3411,3414,3417],{"title":2448,"path":3384,"stem":3385},{"title":3389,"path":3390,"stem":3391},"CON01-C. Acquire and release synchronization primitives in the same module, at the same level of abstraction","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F02.con01-c",{"title":3393,"path":3394,"stem":3395},"CON02-C. Do not use volatile as a synchronization primitive","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F03.con02-c",{"title":3397,"path":3398,"stem":3399},"CON03-C. Ensure visibility when accessing shared variables","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F04.con03-c",{"title":3401,"path":3402,"stem":3403},"CON04-C. Join or detach threads even if their exit status is unimportant","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F05.con04-c",{"title":3405,"path":273,"stem":3406},"CON05-C. Do not perform operations that can block while holding a lock","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F06.con05-c",{"title":3408,"path":3409,"stem":3410},"CON06-C. Ensure that every mutex outlives the data it protects","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F07.con06-c",{"title":3412,"path":301,"stem":3413},"CON07-C. Ensure that compound operations on shared variables are atomic","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F08.con07-c",{"title":3415,"path":359,"stem":3416},"CON08-C. Do not assume that a group of calls to independently atomic methods is atomic","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F09.con08-c",{"title":3418,"path":3419,"stem":3420},"CON09-C. Avoid the ABA problem when using lock-free algorithms","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fconcurrency-con\u002Fcon09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F05.concurrency-con\u002F10.con09-c",{"title":2510,"path":3422,"stem":3423,"children":3424},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F01.index",[3425,3426,3430,3434,3438,3442,3446,3450,3453,3457,3461,3465,3468,3472,3476,3480,3484,3488,3492,3496,3500,3504,3508,3512],{"title":2510,"path":3422,"stem":3423},{"title":3427,"path":3428,"stem":3429},"DCL00-C. Const-qualify immutable objects","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F02.dcl00-c",{"title":3431,"path":3432,"stem":3433},"DCL01-C. Do not reuse variable names in subscopes","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F03.dcl01-c",{"title":3435,"path":3436,"stem":3437},"DCL02-C. Use visually distinct identifiers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F04.dcl02-c",{"title":3439,"path":3440,"stem":3441},"DCL03-C. Use a static assertion to test the value of a constant expression","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F05.dcl03-c",{"title":3443,"path":3444,"stem":3445},"DCL04-C. Do not declare more than one variable per declaration","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F06.dcl04-c",{"title":3447,"path":3448,"stem":3449},"DCL05-C. Use typedefs of non-pointer types only","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F07.dcl05-c",{"title":3451,"path":401,"stem":3452},"DCL06-C. Use meaningful symbolic constants to represent literal values","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F08.dcl06-c",{"title":3454,"path":3455,"stem":3456},"DCL07-C. Include the appropriate type information in function declarators","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F09.dcl07-c",{"title":3458,"path":3459,"stem":3460},"DCL08-C. Properly encode relationships in constant definitions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F10.dcl08-c",{"title":3462,"path":3463,"stem":3464},"DCL09-C. Declare functions that return errno with a return type of errno_t","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F11.dcl09-c",{"title":3466,"path":417,"stem":3467},"DCL10-C. Maintain the contract between the writer and caller of variadic functions","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F12.dcl10-c",{"title":3469,"path":3470,"stem":3471},"DCL11-C. Understand the type issues associated with variadic functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F13.dcl11-c",{"title":3473,"path":3474,"stem":3475},"DCL12-C. Implement abstract data types using opaque types","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F14.dcl12-c",{"title":3477,"path":3478,"stem":3479},"DCL13-C. Declare function parameters that are pointers to values not changed by the function as const","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F15.dcl13-c",{"title":3481,"path":3482,"stem":3483},"DCL15-C. Declare file-scope objects or functions that do not need external linkage as static","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl15-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F16.dcl15-c",{"title":3485,"path":3486,"stem":3487},"DCL16-C. Use \"L,\" not \"l,\" to indicate a long value","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl16-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F17.dcl16-c",{"title":3489,"path":3490,"stem":3491},"DCL17-C. Beware of miscompiled volatile-qualified variables","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl17-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F18.dcl17-c",{"title":3493,"path":3494,"stem":3495},"DCL18-C. Do not begin integer constants with 0 when specifying a decimal value","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl18-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F19.dcl18-c",{"title":3497,"path":3498,"stem":3499},"DCL19-C. Minimize the scope of variables and functions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl19-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F20.dcl19-c",{"title":3501,"path":3502,"stem":3503},"DCL20-C. Explicitly specify void when a function accepts no arguments","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl20-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F21.dcl20-c",{"title":3505,"path":3506,"stem":3507},"DCL21-C. Understand the storage of compound literals","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl21-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F22.dcl21-c",{"title":3509,"path":3510,"stem":3511},"DCL22-C. Use volatile for data that cannot be cached","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl22-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F23.dcl22-c",{"title":3513,"path":3514,"stem":3515},"DCL23-C. Guarantee that mutually visible identifiers are unique","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fdeclarations-and-initialization-dcl\u002Fdcl23-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F06.declarations-and-initialization-dcl\u002F24.dcl23-c",{"title":2548,"path":3517,"stem":3518,"children":3519},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fenvironment-env","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F07.environment-env\u002F1.index",[3520,3521,3524,3527],{"title":2548,"path":3517,"stem":3518},{"title":3522,"path":433,"stem":3523},"ENV01-C. Do not make assumptions about the size of an environment variable","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F07.environment-env\u002F2.env01-c",{"title":3525,"path":477,"stem":3526},"ENV02-C. Beware of multiple environment variables with the same effective name","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F07.environment-env\u002F3.env02-c",{"title":3528,"path":507,"stem":3529},"ENV03-C. Sanitize the environment when invoking external programs","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F07.environment-env\u002F4.env03-c",{"title":2574,"path":3531,"stem":3532,"children":3533},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F1.index",[3534,3535,3538,3542,3546,3549,3553,3557],{"title":2574,"path":3531,"stem":3532},{"title":3536,"path":577,"stem":3537},"ERR00-C. Adopt and implement a consistent and comprehensive error-handling policy","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F2.err00-c",{"title":3539,"path":3540,"stem":3541},"ERR01-C. Use ferror() rather than errno to check for FILE stream errors","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F3.err01-c",{"title":3543,"path":3544,"stem":3545},"ERR02-C. Avoid in-band error indicators","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F4.err02-c",{"title":3547,"path":607,"stem":3548},"ERR04-C. Choose an appropriate termination strategy","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F5.err04-c",{"title":3550,"path":3551,"stem":3552},"ERR05-C. Application-independent code should provide error detection without dictating error handling","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F6.err05-c",{"title":3554,"path":3555,"stem":3556},"ERR06-C. Understand the termination behavior of assert() and abort()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ferror-handling-err\u002Ferr06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F7.err06-c",{"title":3558,"path":623,"stem":3559},"ERR07-C. Prefer functions that support error checking over equivalent functions that don't","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F08.error-handling-err\u002F8.err07-c",{"title":2596,"path":3561,"stem":3562,"children":3563},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F01.index",[3564,3565,3569,3572,3576,3579,3583,3586,3589,3593,3597,3600,3604,3608,3611,3614,3618],{"title":2596,"path":3561,"stem":3562},{"title":3566,"path":3567,"stem":3568},"EXP00-C. Use parentheses for precedence of operation","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F02.exp00-c",{"title":3570,"path":737,"stem":3571},"EXP02-C. Be aware of the short-circuit behavior of the logical AND and OR operators","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F03.exp02-c",{"title":3573,"path":3574,"stem":3575},"EXP03-C. Do not assume the size of a structure is the sum of the sizes of its members","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F04.exp03-c",{"title":3577,"path":753,"stem":3578},"EXP05-C. Do not cast away a const qualification","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F05.exp05-c",{"title":3580,"path":3581,"stem":3582},"EXP07-C. Do not diminish the benefits of constants by assuming their values in expressions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F06.exp07-c",{"title":3584,"path":767,"stem":3585},"EXP08-C. Ensure pointer arithmetic is used correctly","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F07.exp08-c",{"title":3587,"path":783,"stem":3588},"EXP09-C. Use sizeof to determine the size of a type or variable","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F08.exp09-c",{"title":3590,"path":3591,"stem":3592},"EXP10-C. Do not depend on the order of evaluation of subexpressions or the order in which side effects take place","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F09.exp10-c",{"title":3594,"path":3595,"stem":3596},"EXP11-C. Do not make assumptions regarding the layout of structures with bit-fields","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F10.exp11-c",{"title":3598,"path":799,"stem":3599},"EXP12-C. Do not ignore values returned by functions","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F11.exp12-c",{"title":3601,"path":3602,"stem":3603},"EXP13-C. Treat relational and equality operators as if they were nonassociative","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F12.exp13-c",{"title":3605,"path":3606,"stem":3607},"EXP14-C. Beware of integer promotion when performing bitwise operations on integer types smaller than int","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp14-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F13.exp14-c",{"title":3609,"path":815,"stem":3610},"EXP15-C. Do not place a semicolon on the same line as an if, for, or while statement","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F14.exp15-c",{"title":3612,"path":831,"stem":3613},"EXP16-C. Do not compare function pointers to constant values","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F15.exp16-c",{"title":3615,"path":3616,"stem":3617},"EXP19-C. Use braces for the body of an if, for, or while statement","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp19-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F16.exp19-c",{"title":3619,"path":3620,"stem":3621},"EXP20-C. Perform explicit tests to determine success, true and false, and equality","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fexpressions-exp\u002Fexp20-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F09.expressions-exp\u002F17.exp20-c",{"title":2662,"path":3623,"stem":3624,"children":3625},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F1.index",[3626,3627,3631,3635,3639,3642,3646,3650,3653],{"title":2662,"path":3623,"stem":3624},{"title":3628,"path":3629,"stem":3630},"FLP00-C. Understand the limitations of floating-point numbers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F2.flp00-c",{"title":3632,"path":3633,"stem":3634},"FLP01-C. Take care in rearranging floating-point expressions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F3.flp01-c",{"title":3636,"path":3637,"stem":3638},"FLP02-C. Avoid using floating-point numbers when precise computation is needed","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F4.flp02-c",{"title":3640,"path":1241,"stem":3641},"FLP03-C. Detect and handle floating-point errors","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F5.flp03-c",{"title":3643,"path":3644,"stem":3645},"FLP04-C. Check floating-point inputs for exceptional values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F6.flp04-c",{"title":3647,"path":3648,"stem":3649},"FLP05-C. Do not use denormalized numbers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F7.flp05-c",{"title":3651,"path":1257,"stem":3652},"FLP06-C. Convert integers to floating point for floating-point operations","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F8.flp06-c",{"title":3654,"path":3655,"stem":3656},"FLP07-C. Cast the return value of a function that returns a floating-point type","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Ffloating-point-flp\u002Fflp07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F10.floating-point-flp\u002F9.flp07-c",{"title":2688,"path":3658,"stem":3659,"children":3660},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F01.index",[3661,3662,3665,3668,3672,3675,3678,3682,3686,3690,3694,3698,3702,3705,3709,3713,3717,3721,3724,3727,3731],{"title":2688,"path":3658,"stem":3659},{"title":3663,"path":858,"stem":3664},"FIO01-C. Be careful using functions that use file names for identification","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F02.fio01-c",{"title":3666,"path":899,"stem":3667},"FIO02-C. Canonicalize path names originating from tainted sources","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F03.fio02-c",{"title":3669,"path":3670,"stem":3671},"FIO03-C. Do not make assumptions about fopen() and file creation","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F04.fio03-c",{"title":3673,"path":996,"stem":3674},"FIO05-C. Identify files using multiple file attributes","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F05.fio05-c",{"title":3676,"path":1082,"stem":3677},"FIO06-C. Create files with appropriate access permissions","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F06.fio06-c",{"title":3679,"path":3680,"stem":3681},"FIO08-C. Take care when calling remove() on an open file","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F07.fio08-c",{"title":3683,"path":3684,"stem":3685},"FIO09-C. Be careful with binary data when transferring data across systems","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F08.fio09-c",{"title":3687,"path":3688,"stem":3689},"FIO10-C. Take care when using the rename() function","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F09.fio10-c",{"title":3691,"path":3692,"stem":3693},"FIO11-C. Take care when specifying the mode parameter of fopen()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F10.fio11-c",{"title":3695,"path":3696,"stem":3697},"FIO13-C. Never push back anything other than one read character","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F11.fio13-c",{"title":3699,"path":3700,"stem":3701},"FIO14-C. Understand the difference between text mode and binary mode with file streams","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio14-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F12.fio14-c",{"title":3703,"path":1126,"stem":3704},"FIO15-C. Ensure that file operations are performed in a secure directory","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F13.fio15-c",{"title":3706,"path":3707,"stem":3708},"FIO17-C. Do not rely on an ending null character when using fread()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio17-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F14.fio17-c",{"title":3710,"path":3711,"stem":3712},"FIO18-C. Never expect fwrite() to terminate the writing process at a null character","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio18-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F15.fio18-c",{"title":3714,"path":3715,"stem":3716},"FIO19-C. Do not use fseek() and ftell() to compute the size of a regular file","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio19-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F16.fio19-c",{"title":3718,"path":3719,"stem":3720},"FIO20-C. Avoid unintentional truncation when using fgets() or fgetws()","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio20-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F17.fio20-c",{"title":3722,"path":1156,"stem":3723},"FIO21-C. Do not create temporary files in shared directories","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F18.fio21-c",{"title":3725,"path":1169,"stem":3726},"FIO22-C. Close files before spawning processes","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F19.fio22-c",{"title":3728,"path":3729,"stem":3730},"FIO23-C. Do not exit with unflushed data in stdout or stderr","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Finput-output-fio\u002Ffio23-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F20.fio23-c",{"title":3732,"path":1213,"stem":3733},"FIO24-C. Do not open a file that is already open","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F11.input-output-fio\u002F21.fio24-c",{"title":2746,"path":3735,"stem":3736,"children":3737},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F01.index",[3738,3739,3743,3747,3751,3754,3757,3761,3765,3768,3772,3775,3779,3782,3786,3790],{"title":2746,"path":3735,"stem":3736},{"title":3740,"path":3741,"stem":3742},"INT00-C. Understand the data model used by your implementation(s)","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F02.int00-c",{"title":3744,"path":3745,"stem":3746},"INT01-C. Use size_t or rsize_t for all integer values representing the size of an object","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F03.int01-c",{"title":3748,"path":3749,"stem":3750},"INT04-C. Enforce limits on integer values originating from tainted sources","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F05.int04-c",{"title":3752,"path":1316,"stem":3753},"INT05-C. Do not use input functions to convert character data if they cannot handle all possible inputs","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F06.int05-c",{"title":3755,"path":1340,"stem":3756},"INT07-C. Use only explicitly signed or unsigned char type for numeric values","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F07.int07-c",{"title":3758,"path":3759,"stem":3760},"INT08-C. Verify that all integer values are in range","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F08.int08-c",{"title":3762,"path":3763,"stem":3764},"INT09-C. Ensure enumeration constants map to unique values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint09-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F09.int09-c",{"title":3766,"path":1353,"stem":3767},"INT10-C. Do not assume a positive remainder when using the % operator","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F10.int10-c",{"title":3769,"path":3770,"stem":3771},"INT12-C. Do not make assumptions about the type of a plain int bit-field when used in an expression","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F11.int12-c",{"title":3773,"path":1380,"stem":3774},"INT13-C. Use bitwise operators only on unsigned operands","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F12.int13-c",{"title":3776,"path":3777,"stem":3778},"INT14-C. Avoid performing bitwise and arithmetic operations on the same data","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint14-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F13.int14-c",{"title":3780,"path":1393,"stem":3781},"INT15-C. Use intmax_t or uintmax_t for formatted IO on programmer-defined integer types","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F14.int15-c",{"title":3783,"path":3784,"stem":3785},"INT16-C. Do not make assumptions about representation of signed integers","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint16-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F15.int16-c",{"title":3787,"path":3788,"stem":3789},"INT17-C. Define integer constants in an implementation-independent manner","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fintegers-int\u002Fint17-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F16.int17-c",{"title":3791,"path":1406,"stem":3792},"INT18-C. Evaluate integer expressions in a larger size before comparing or assigning to that size","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F12.integers-int\u002F17.int18-c",{"title":2780,"path":3794,"stem":3795,"children":3796},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F01.index",[3797,3798,3801,3804,3808,3811,3814,3818,3821,3824,3827,3830],{"title":2780,"path":3794,"stem":3795},{"title":3799,"path":1433,"stem":3800},"MEM00-C. Allocate and free memory in the same module, at the same level of abstraction","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F02.mem00-c",{"title":3802,"path":1463,"stem":3803},"MEM01-C. Store a new value in pointers immediately after free()","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F03.mem01-c",{"title":3805,"path":3806,"stem":3807},"MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F04.mem02-c",{"title":3809,"path":1487,"stem":3810},"MEM03-C. Clear sensitive information stored in reusable resources","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F05.mem03-c",{"title":3812,"path":1517,"stem":3813},"MEM04-C. Beware of zero-length allocations","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F06.mem04-c",{"title":3815,"path":3816,"stem":3817},"MEM05-C. Avoid large stack allocations","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F07.mem05-c",{"title":3819,"path":1533,"stem":3820},"MEM06-C. Ensure that sensitive data is not written out to disk","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F08.mem06-c",{"title":3822,"path":1563,"stem":3823},"MEM07-C. Ensure that the arguments to calloc(), when multiplied, do not wrap","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F09.mem07-c",{"title":3825,"path":1590,"stem":3826},"MEM10-C. Define and use a pointer validation function","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F10.mem10-c",{"title":3828,"path":1669,"stem":3829},"MEM11-C. Do not assume infinite heap space","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F11.mem11-c",{"title":3831,"path":3832,"stem":3833},"MEM12-C. Consider using a goto chain when leaving a function on error when using and releasing resources","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmemory-management-mem\u002Fmem12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F13.memory-management-mem\u002F12.mem12-c",{"title":2810,"path":3835,"stem":3836,"children":3837},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F1.index",[3838,3839,3843,3847,3850,3854],{"title":2810,"path":3835,"stem":3836},{"title":3840,"path":3841,"stem":3842},"WIN00-C. Be specific when dynamically loading libraries","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F2.win00-c",{"title":3844,"path":3845,"stem":3846},"WIN01-C. Do not forcibly terminate execution","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F3.win01-c",{"title":3848,"path":2238,"stem":3849},"WIN02-C. Restrict privileges when spawning child processes","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F4.win02-c",{"title":3851,"path":3852,"stem":3853},"WIN03-C. Understand HANDLE inheritance","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmicrosoft-windows-win\u002Fwin03-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F5.win03-c",{"title":3855,"path":2262,"stem":3856},"WIN04-C. Consider encrypting function pointers","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F14.microsoft-windows-win\u002F6.win04-c",{"title":2820,"path":3858,"stem":3859,"children":3860},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F01.index",[3861,3862,3865,3869,3873,3877,3880,3883,3886,3889,3893,3897,3901,3905,3909,3912,3916,3920,3924,3928,3932,3935,3939],{"title":2820,"path":3858,"stem":3859},{"title":3863,"path":1682,"stem":3864},"MSC00-C. Compile cleanly at high warning levels","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F02.msc00-c",{"title":3866,"path":3867,"stem":3868},"MSC01-C. Strive for logical completeness","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F03.msc01-c",{"title":3870,"path":3871,"stem":3872},"MSC04-C. Use comments consistently and in a readable fashion","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F04.msc04-c",{"title":3874,"path":3875,"stem":3876},"MSC05-C. Do not manipulate time_t typed values directly","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F05.msc05-c",{"title":3878,"path":1726,"stem":3879},"MSC06-C. Beware of compiler optimizations","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F06.msc06-c",{"title":3881,"path":1742,"stem":3882},"MSC07-C. Detect and remove dead code","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F07.msc07-c",{"title":3884,"path":1774,"stem":3885},"UTF8-related issues","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F08.utf8-related-issues",{"title":3887,"path":1801,"stem":3888},"MSC11-C. Incorporate diagnostic tests using assertions","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F09.msc11-c",{"title":3890,"path":3891,"stem":3892},"MSC12-C. Detect and remove code that has no effect or is never executed","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F10.msc12-c",{"title":3894,"path":3895,"stem":3896},"MSC13-C. Detect and remove unused values","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F11.msc13-c",{"title":3898,"path":3899,"stem":3900},"MSC14-C. Do not introduce unnecessary platform dependencies","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc14-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F12.msc14-c",{"title":3902,"path":3903,"stem":3904},"MSC15-C. Do not depend on undefined behavior","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc15-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F13.msc15-c",{"title":3906,"path":3907,"stem":3908},"MSC17-C. Finish every set of statements associated with a case label with a break statement","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc17-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F14.msc17-c",{"title":3910,"path":1816,"stem":3911},"MSC18-C. Be careful while handling sensitive data, such as passwords, in program code","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F15.msc18-c",{"title":3913,"path":3914,"stem":3915},"MSC19-C. For functions that return an array, prefer returning an empty array over a null value","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc19-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F16.msc19-c",{"title":3917,"path":3918,"stem":3919},"MSC20-C. Do not use a switch statement to transfer control into a complex block","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc20-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F17.msc20-c",{"title":3921,"path":3922,"stem":3923},"MSC21-C. Use robust loop termination conditions","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc21-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F18.msc21-c",{"title":3925,"path":3926,"stem":3927},"MSC22-C. Use the setjmp(), longjmp() facility securely","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc22-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F19.msc22-c",{"title":3929,"path":3930,"stem":3931},"MSC23-C. Beware of vendor-specific library and language differences","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc23-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F20.msc23-c",{"title":3933,"path":1913,"stem":3934},"MSC24-C. Do not use deprecated or obsolescent functions","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F21.msc24-c",{"title":3936,"path":3937,"stem":3938},"MSC25-C. Do not use insecure or weak cryptographic algorithms","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fmiscellaneous-msc\u002Fmsc25-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F22.msc25-c",{"title":3940,"path":1758,"stem":3941},"Use subset of ASCII for safety","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F15.miscellaneous-msc\u002F23.use-subset-of-ascii-for-safety",{"title":2857,"path":3943,"stem":3944,"children":3945},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F1.index",[3946,3947,3950,3953,3957],{"title":2857,"path":3943,"stem":3944},{"title":3948,"path":2077,"stem":3949},"POS01-C. Check for the existence of links when dealing with files","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F2.pos01-c",{"title":3951,"path":2114,"stem":3952},"POS02-C. Follow the principle of least privilege","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F3.pos02-c",{"title":3954,"path":3955,"stem":3956},"POS04-C. Avoid using PTHREAD_MUTEX_NORMAL type mutex locks","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos\u002Fpos04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F4.pos04-c",{"title":3958,"path":3959,"stem":3960},"POS05-C. Limit access to files by creating a jail","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fposix-pos\u002Fpos05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F16.posix-pos\u002F5.pos05-c",{"title":2927,"path":3962,"stem":3963,"children":3964},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F01.index",[3965,3966,3970,3974,3978,3982,3986,3990,3994,3998,4001,4005,4009,4013],{"title":2927,"path":3962,"stem":3963},{"title":3967,"path":3968,"stem":3969},"PRE00-C. Prefer inline or static functions to function-like macros","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre00-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F02.pre00-c",{"title":3971,"path":3972,"stem":3973},"PRE01-C. Use parentheses within macros around parameter names","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F03.pre01-c",{"title":3975,"path":3976,"stem":3977},"PRE02-C. Macro replacement lists should be parenthesized","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F04.pre02-c",{"title":3979,"path":3980,"stem":3981},"PRE04-C. Do not reuse a standard header file name","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre04-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F05.pre04-c",{"title":3983,"path":3984,"stem":3985},"PRE05-C. Understand macro replacement when concatenating tokens or performing stringification","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre05-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F06.pre05-c",{"title":3987,"path":3988,"stem":3989},"PRE06-C. Enclose header files in an include guard","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre06-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F07.pre06-c",{"title":3991,"path":3992,"stem":3993},"PRE07-C. Avoid using repeated question marks","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre07-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F08.pre07-c",{"title":3995,"path":3996,"stem":3997},"PRE08-C. Guarantee that header file names are unique","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre08-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F09.pre08-c",{"title":3999,"path":2144,"stem":4000},"PRE09-C. Do not replace secure functions with deprecated or obsolescent functions","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F10.pre09-c",{"title":4002,"path":4003,"stem":4004},"PRE10-C. Wrap multistatement macros in a do-while loop","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre10-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F11.pre10-c",{"title":4006,"path":4007,"stem":4008},"PRE11-C. Do not conclude macro definitions with a semicolon","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre11-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F12.pre11-c",{"title":4010,"path":4011,"stem":4012},"PRE12-C. Do not define unsafe macros","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre12-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F13.pre12-c",{"title":4014,"path":4015,"stem":4016},"PRE13-C. Use the Standard predefined macros to test for versions and features.","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fpreprocessor-pre\u002Fpre13-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F17.preprocessor-pre\u002F14.pre13-c",{"title":2945,"path":4018,"stem":4019,"children":4020},"\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fsignals-sig","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F18.signals-sig\u002F1.index",[4021,4022,4025,4029],{"title":2945,"path":4018,"stem":4019},{"title":4023,"path":2160,"stem":4024},"SIG00-C. Mask signals handled by noninterruptible signal handlers","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F18.signals-sig\u002F2.sig00-c",{"title":4026,"path":4027,"stem":4028},"SIG01-C. Understand implementation-specific details regarding signal handler persistence","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fsignals-sig\u002Fsig01-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F18.signals-sig\u002F3.sig01-c",{"title":4030,"path":4031,"stem":4032},"SIG02-C. Avoid using signals to implement normal functionality","\u002Fsei-cert-c-coding-standard\u002Frecommendations\u002Fsignals-sig\u002Fsig02-c","4.sei-cert-c-coding-standard\u002F08.recommendations\u002F18.signals-sig\u002F4.sig02-c",{"title":4034,"path":4035,"stem":4036},"CERT manifest files","\u002Fsei-cert-c-coding-standard\u002Fcert-manifest-files","4.sei-cert-c-coding-standard\u002F09.cert-manifest-files",1775657855196]