View-750: Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors
ID: 750
Type: Graph
Status: Obsolete
Objective
CWE entries in this view (graph) are listed in the 2009 CWE/SANS Top 25 Programming Errors. This view is considered obsolete as a newer version of the Top 25 is available.
Audience
Software Developers
By following the Top 25, developers will be able to significantly reduce the number of weaknesses that occur in their software.
Software Customers
If a software developer claims to be following the Top 25, then customers can search for the weaknesses in this view in order to formulate independent evidence of that claim.
Educators
Educators can use this view in multiple ways. For example, if there is a focus on teaching weaknesses, the educator could focus on the Top 25.
Membership
CWE-ID | title |
---|---|
CWE-751 | 2009 Top 25 - Insecure Interaction Between Components |
CWE-752 | 2009 Top 25 - Risky Resource Management |
CWE-753 | 2009 Top 25 - Porous Defenses |
引用
REF-615 2009 CWE/SANS Top 25 Most Dangerous Programming Errors
文章来源于互联网:scap中文网
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论