CERT C Secure Coding Section 10 - Environment (ENV) |
| Category ID: 744 (Category) | Status: Incomplete |
Description Summary
Weaknesses in this category are related to rules in the environment section of the CERT C Secure Coding Standard. Since not all rules map to specific weaknesses, this category may be incomplete.
| Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
|---|---|---|---|---|
| ParentOf | Weakness Base | 78 | Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') | Weaknesses Addressed by the CERT C Secure Coding Standard734 |
| ParentOf | Weakness Base | 88 | Argument Injection or Modification | Weaknesses Addressed by the CERT C Secure Coding Standard734 |
| ParentOf | Weakness Class | 119 | Failure to Constrain Operations within the Bounds of a Memory Buffer | Weaknesses Addressed by the CERT C Secure Coding Standard734 |
| ParentOf | Compound Element: Composite | 426 | Untrusted Search Path | Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734 |
| ParentOf | Weakness Base | 462 | Duplicate Key in Associative List (Alist) | Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734 |
| ParentOf | Weakness Class | 705 | Incorrect Control Flow Scoping | Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734 |
| MemberOf | View | 734 | Weaknesses Addressed by the CERT C Secure Coding Standard | Weaknesses Addressed by the CERT C Secure Coding Standard (primary)734 |
| CERT. "10. Environment (ENV)". <https://www.securecoding.cert.org/confluence/display/seccode/10.+Environment+%28ENV%29>. |








