Weaknesses Addressed by the CERT Java Secure Coding Standard
Description By following the CERT Java Secure Coding Standard, developers will be able to fully or partially prevent the weaknesses that are identified in this view. In addition, developers can use a CWE coverage graph to determine which weaknesses are not directly addressed by the standard, which will help identify and resolve remaining gaps in training, tool acquisition, or other approaches for reducing weaknesses. CWE entries in this view (graph) are fully or partially eliminated by following the CERT Java Secure Coding Standard. Since not all rules map to specific weaknesses, this view is incomplete. Applicable PlatformsNone Common ConsequencesNone Detection MethodsNone Potential MitigationsNone RelationshipsThe relationships in this view were determined based on specific statements within the rules from the standard. Not all rules have direct relationships to individual weaknesses, although they likely have chaining relationships in specific circumstances.
Demonstrative ExamplesNone White Box Definitions None Black Box Definitions None Taxynomy MappingsNone References: |