Weaknesses Addressed by the CERT C Secure Coding Standard
|ID: 734||Date: (C)2012-05-14 (M)2012-11-08|
|Type: view||Status: INCOMPLETE|
By following the CERT C Secure Coding Standard, developers will be
able to fully or partially prevent the weaknesses that are identified in
this view. In addition, developers can use a CWE coverage graph to
determine which weaknesses are not directly addressed by the standard,
which will help identify and resolve remaining gaps in training, tool
acquisition, or other approaches for reducing weaknesses.
CWE entries in this view (graph) are fully or partially eliminated by
following the CERT C Secure Coding Standard. Since not all rules map to specific
weaknesses, this view is incomplete.
RelationshipsThe relationships in this view were determined based on specific
statements within the rules from the standard. Not all rules have direct
relationships to individual weaknesses, although they likely have chaining
relationships in specific circumstances.
|CWE-734 HasMember CWE-748 ||Category ||7 || |
White Box Definitions None
Black Box Definitions None
- .The CERT C Secure Coding Standard. Addison-Wesley Professional. 2008-10-14.
- .The CERT C Secure Coding Standard.