CERT C Secure Coding Section 10 - Environment (ENV)
Category ID: 744 (Category)Status: Incomplete
+ Description

Description Summary

Weaknesses in this category are related to rules in the environment section of the CERT C Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.
+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ParentOfWeakness BaseWeakness Base78Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection')
Weaknesses Addressed by the CERT C Secure Coding Standard734
ParentOfWeakness BaseWeakness Base88Argument Injection or Modification
Weaknesses Addressed by the CERT C Secure Coding Standard734
ParentOfWeakness ClassWeakness Class119Failure to Constrain Operations within the Bounds of a Memory Buffer
Weaknesses Addressed by the CERT C Secure Coding Standard734
ParentOfCompound Element: CompositeCompound Element: Composite426Untrusted Search Path
Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734
ParentOfWeakness BaseWeakness Base462Duplicate Key in Associative List (Alist)
Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734
ParentOfWeakness ClassWeakness Class705Incorrect Control Flow Scoping
Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734
MemberOfViewView734Weaknesses Addressed by the CERT C Secure Coding Standard
Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734
+ Content History
Submissions
Submission DateSubmitterOrganizationSource
2008-11-24Internal CWE Team