Read Time:21 Second
Description
The software does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities.
Modes of Introduction:
– Architecture and Design
Likelihood of Exploit:
Related Weaknesses
Consequences
Other: Other
Potential Mitigations
Phase: Implementation
Effectiveness:
Description:
Document and closely follow coding standards.
Phase: Testing, Implementation
Effectiveness:
Description:
Where possible, use automated tools to enforce the standards.
CVE References