CERT C Secure Coding Section 10 - Environment (ENV) |
Category ID: 744 (Category) | Status: Incomplete |
Description Summary
Weaknesses in this category are related to rules in the environment section of the CERT C Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ParentOf | Weakness Base | 78 | Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') | Weaknesses Addressed by the CERT C Secure Coding Standard734 |
ParentOf | Weakness Base | 88 | Argument Injection or Modification | Weaknesses Addressed by the CERT C Secure Coding Standard734 |
ParentOf | Weakness Class | 119 | Failure to Constrain Operations within the Bounds of a Memory Buffer | Weaknesses Addressed by the CERT C Secure Coding Standard734 |
ParentOf | Compound Element: Composite | 426 | Untrusted Search Path | Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734 |
ParentOf | Weakness Base | 462 | Duplicate Key in Associative List (Alist) | Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734 |
ParentOf | Weakness Class | 705 | Incorrect Control Flow Scoping | Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734 |
MemberOf | View | 734 | Weaknesses Addressed by the CERT C Secure Coding Standard | Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734 |
CERT. "10. Environment (ENV)". <https://www.securecoding.cert.org/confluence/display/seccode/10.+Environment+%28ENV%29>. |