MITRE CWE
This page was automatically generated and should not be edited.
The information on this page was provided by outside contributors and has not been verified by SEI CERT.
CERT Rule | Related Guidelines |
|---|---|
| IDS00-J | CWE-116 , Improper Encoding or Escaping of Output |
| IDS01-J | CWE-289 , Authentication bypass by alternate name |
| IDS01-J | CWE-180 , Incorrect behavior order: Validate before canonicalize |
| IDS03-J | CWE-144 , Improper neutralization of line delimiters |
| IDS03-J | CWE-150 , Improper neutralization of escape, meta, or control sequences |
| IDS03-J | CWE-117 , Improper Output Neutralization for Logs |
| IDS04-J | CWE-409 , Improper Handling of Highly Compressed Data (Data Amplification) |
| IDS06-J | CWE-134 , Uncontrolled Format String |
| IDS07-J | CWE-78, Improper Neutralization of Special Elements Used in an OS Command ("OS Command Injection") |
| IDS08-J | CWE-625 , Permissive Regular Expression |
| IDS11-J | CWE-182 , Collapse of Data into Unsafe Value |
| IDS16-J | CWE-116 , Improper Encoding or Escaping of Output |
| IDS17-J | CWE-116 , Improper Encoding or Escaping of Output |
| DCL00-J | CWE-665 , Improper Initialization |
| EXP00-J | CWE-252 , Unchecked Return Value |
| EXP01-J | CWE-476, NULL Pointer Dereference |
| EXP02-J | CWE-595 , Comparison of Object References Instead of Object Contents |
| EXP03-J | CWE-595 , Comparison of Object References Instead of Object Contents |
| EXP03-J | CWE-597 , Use of Wrong Operator in String Comparison |
| NUM00-J | CWE-682 , Incorrect Calculation |
| NUM00-J | CWE-190 , Integer Overflow or Wraparound |
| NUM00-J | CWE-191 , Integer Underflow (Wrap or Wraparound) |
| NUM02-J | CWE-369 , Divide by Zero |
| NUM12-J | CWE-681 , Incorrect Conversion between Numeric Types |
| NUM12-J | CWE-197 , Numeric Truncation Error |
| STR03-J | CWE-838 , Inappropriate Encoding for Output Context |
| OBJ01-J | CWE-766 , Critical Variable Declared Public |
| OBJ04-J | CWE-374 , Passing Mutable Objects to an Untrusted Method |
| OBJ04-J | CWE-375 , Returning a Mutable Object to an Untrusted Caller |
| OBJ05-J | CWE-375 , Returning a Mutable Object to an Untrusted Caller |
| OBJ07-J | CWE-498 , Cloneable Class Containing Sensitive Information |
| OBJ07-J | CWE-491 , Public cloneable() Method without Final (aka "Object Hijack") |
| OBJ08-J | CWE-492 , Use of Inner Class Containing Sensitive Data |
| OBJ09-J | CWE-486 , Comparison of Classes by Name |
| OBJ10-J | CWE-493 , Critical Public Variable without Final Modifier |
| OBJ10-J | CWE-500 , Public Static Field Not Marked Final |
| OBJ14-J | CWE-416 , Use After Free |
| MET01-J | CWE-617 , Reachable Assertion |
| MET02-J | CWE-589 , Call to Non-ubiquitous API |
| MET04-J | CWE-487 , Reliance on Package-Level Scope |
| MET08-J | CWE-697 , Insufficient Comparison |
| MET09-J | CWE-581 , Object Model Violation: Just One of equals and hashcode Defined |
| MET10-J | CWE-573 , Improper Following of Specification by Caller |
| MET12-J | CWE-586 , Explicit call to Finalize() |
| MET12-J | CWE-583 , finalize() Method Declared Public |
| MET12-J | CWE-568 , finalize() Method without super.finalize() |
| ERR00-J | CWE-390 , Detection of Error Condition without Action |
| ERR01-J | CWE-209 , Information Exposure through an Error Message |
| ERR01-J | CWE-497 , Exposure of System Data to an Unauthorized Control Sphere |
| ERR01-J | CWE-600 , Uncaught Exception in Servlet |
| ERR03-J | CWE-460 , Improper Cleanup on Thrown Exception |
| ERR04-J | CWE-459 , Incomplete Cleanup |
| ERR04-J | CWE-584 , Return Inside finally Block |
| ERR05-J | CWE-248 , Uncaught Exception |
| ERR05-J | CWE-460 , Improper Cleanup on Thrown Exception |
| ERR05-J | CWE-584 , Return inside finally Block |
| ERR05-J | CWE-705 , Incorrect Control Flow Scoping |
| ERR05-J | CWE-754 , Improper Check for Unusual or Exceptional Conditions |
| ERR06-J | CWE-703 , Improper Check or Handling of Exceptional Conditions |
| ERR06-J | CWE-248 , Uncaught Exception |
| ERR07-J | CWE-397 , Declaration of Throws for Generic Exception |
| ERR09-J | CWE-382 , J2EE Bad Practices: Use of System.exit() |
| VNA00-J | CWE-413 , Improper Resource Locking |
| VNA00-J | CWE-567, Unsynchronized Access to Shared Data in a Multithreaded Context |
| VNA00-J | CWE-667 , Improper Locking |
| VNA03-J | CWE-362 , Concurrent Execution Using Shared Resource with Improper Synchronization ("Race Condition") |
| VNA03-J | CWE-366 , Race Condition within a Thread |
| VNA03-J | CWE-662 , Improper Synchronization |
| VNA05-J | CWE-667, Improper Locking |
| LCK00-J | CWE-412 . Unrestricted externally accessible lock |
| LCK05-J | CWE-820 , Missing Synchronization |
| LCK06-J | CWE-667 , Improper Locking |
| LCK07-J | CWE-833 , Deadlock |
| LCK08-J | CWE-883 , Deadlock |
| LCK10-J | CWE-609 , Double-checked Locking |
| THI00-J | CWE-572 , Call to Thread run() instead of start() |
| THI05-J | CWE-705 , Incorrect Control Flow Scoping |
| TPS00-J | CWE-405 , Asymmetric Resource Consumption (Amplification) |
| TPS00-J | CWE-410 , Insufficient Resource Pool |
| TPS03-J | CWE-392 , Missing Report of Error Condition |
| FIO00-J | CWE-67 , Improper Handling of Windows Device Names |
| FIO01-J | CWE-279 , Incorrect Execution-Assigned Permissions |
| FIO01-J | CWE-276 , Incorrect Default Permissions |
| FIO01-J | CWE-732 , Incorrect Permission Assignment for Critical Resource |
| FIO03-J | CWE-377 , Insecure Temporary File |
| FIO03-J | CWE-459, Incomplete Cleanup |
| FIO04-J | CWE-404 , Improper Resource Shutdown or Release |
| FIO04-J | CWE-405 , Asymmetric Resource Consumption (Amplification) |
| FIO04-J | CWE-459 , Incomplete Cleanup |
| FIO04-J | CWE-770 , Allocation of Resources without Limits or Throttling |
| FIO09-J | CWE-252 , Unchecked Return Value |
| FIO10-J | CWE-135 , Incorrect Calculation of Multi-byte String Length |
| FIO12-J | CWE-198 , Use of Incorrect Byte Ordering |
| FIO13-J | CWE-359 , Privacy Violation |
| FIO13-J | CWE-532 , Information Exposure through Log Files |
| FIO13-J | CWE-533 , Information Exposure through Server Log Files |
| FIO13-J | CWE-542 , Information Exposure through Cleanup Log Files |
| FIO14-J | CWE-705 , Incorrect Control Flow Scoping |
| FIO16-J | CWE-171 , Cleansing, Canonicalization, and Comparison Errors |
| FIO16-J | CWE-647 , Use of Non-canonical URL Paths for Authorization Decisions |
| SER00-J | CWE-589 , Call to Non-ubiquitous API |
| SER01-J | CWE-502 , Deserialization of Untrusted Data |
| SER02-J | CWE-319 , Cleartext Transmission of Sensitive Information |
| SER03-J | CWE-499 , Serializable Class Containing Sensitive Data |
| SER03-J | CWE-502 , Deserialization of Untrusted Data |
| SER05-J | CWE-499 , Serializable Class Containing Sensitive Data |
| SER06-J | CWE-502 , Deserialization of Untrusted Data |
| SER07-J | CWE-502 , "Deserialization of Untrusted Data" |
| SER08-J | CWE-250 , Execution with Unnecessary Privileges |
| SER10-J | CWE-400 , Uncontrolled Resource Consumption (aka "Resource Exhaustion") |
| SER10-J | CWE-770 , Allocation of Resources without Limits or Throttling |
| SER12-J | CWE-502 , Deserialization of Untrusted Data |
| SEC00-J | CWE-266 , Incorrect Privilege Assignment |
| SEC00-J | CWE-272 , Least Privilege Violation |
| SEC01-J | CWE-266 , Incorrect Privilege Assignment |
| SEC01-J | CWE-272 , Least Privilege Violation |
| SEC01-J | CWE-732 , Incorrect Permission Assignment for Critical Resource |
| SEC02-J | CWE-302 , Authentication Bypass by Assumed-Immutable Data |
| SEC02-J | CWE-470 , Use of Externally-Controlled Input to Select Classes or Code ("Unsafe Reflection") |
| SEC06-J | CWE-300 , Channel Accessible by Non-endpoint (aka "Man-in-the-Middle") |
| SEC06-J | CWE-319 , Cleartext Transmission of Sensitive Information |
| SEC06-J | CWE-347 , Improper Verification of Cryptographic Signature |
| SEC06-J | CWE-494 , Download of Code without Integrity Check |
| ENV01-J | CWE-349 , Acceptance of Extraneous Untrusted Data with Trusted Data |
| ENV03-J | CWE-732 , Incorrect Permission Assignment for Critical Resource |
| JNI00-J | CWE-111 , Direct Use of Unsafe JNI |
| MSC00-J | CWE-311 , Failure to Encrypt Sensitive Data |
| MSC02-J | CWE-327 , Use of a Broken or Risky Cryptographic Algorithm |
| MSC02-J | CWE-330 , Use of Insufficiently Random Values |
| MSC02-J | CWE-332 , Insufficient Entropy in PRNG |
| MSC02-J | CWE-336 , Same Seed in PRNG |
| MSC02-J | CWE-337 , Predictable Seed in PRNG |
| MSC03-J | CWE-259 , Use of Hard-Coded Password |
| MSC03-J | CWE-798 , Use of Hard-Coded Credentials |
| MSC04-J | CWE-401 , Improper Release of Memory before Removing Last Reference ("Memory Leak") |
| MSC05-J | CWE-400 , Uncontrolled Resource Consumption ("Resource Exhaustion") |
| MSC05-J | CWE-770 , Allocation of Resources without Limits or Throttling |
| MSC07-J | CWE-543 , Use of Singleton Pattern without Synchronization in a Multithreaded Context |
| IDS50-J | CWE-116 , Improper encoding or escaping of output |
| SEC58-J | CWE-502 , Deserialization of Untrusted Data |
| STR51-J | CWE-838 . Inappropriate Encoding for Output Context |