[REF-7] Michael Howard and Expressions (EXP), SEI CERT C Coding Standard - Guidelines 12. This information is often useful in understanding where a weakness fits within the context of external information sources. java"HP Fortify v3.50""Null Dereference"Fortifynull. 2005. This argument ignores three important considerations: The following examples read a file into a byte array. Reply Cancel Cancel; Top Take the following code: Integer num; num = new Integer(10); Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Fix : Analysis found that this is a false positive result; no code changes are required. Expressions (EXP), Weaknesses in the 2019 CWE Top 25 Most Dangerous Software Errors, Weaknesses in the 2021 CWE Top 25 Most Dangerous Software Weaknesses, Weaknesses in the 2020 CWE Top 25 Most Dangerous Software Weaknesses, Weaknesses in the 2022 CWE Top 25 Most Dangerous Software Weaknesses, https://samate.nist.gov/SSATTM_Content/papers/Seven%20Pernicious%20Kingdoms%20-%20Taxonomy%20of%20Sw%20Security%20Errors%20-%20Tsipenyuk%20-%20Chess%20-%20McGraw.pdf, https://cwe.mitre.org/documents/sources/TheCLASPApplicationSecurityProcess.pdf, https://en.wikipedia.org/wiki/Null_pointer#Null_dereferencing, https://developer.apple.com/documentation/code_diagnostics/undefined_behavior_sanitizer/null_reference_creation_and_null_pointer_dereference, https://www.immuniweb.com/vulnerability/null-pointer-dereference.html, Cybersecurity and Infrastructure Security Agency, Homeland Security Systems Engineering and Development Institute, Null Dereference (Null Pointer Dereference), updated Applicable_Platforms, Common_Consequences, Relationships, Other_Notes, Taxonomy_Mappings, Weakness_Ordinalities, updated Common_Consequences, Demonstrative_Examples, Other_Notes, Potential_Mitigations, Weakness_Ordinalities, updated Potential_Mitigations, Relationships, updated Demonstrative_Examples, Description, Detection_Factors, Potential_Mitigations, updated Demonstrative_Examples, Observed_Examples, Relationships, updated Related_Attack_Patterns, Relationships, updated Observed_Examples, Related_Attack_Patterns, Relationships, updated Relationships, Taxonomy_Mappings, White_Box_Definitions, updated Demonstrative_Examples, Observed_Examples, updated Alternate_Terms, Applicable_Platforms, Observed_Examples. one or more programmer assumptions being violated. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase. All rights reserved. Null pointer errors are usually the result of Not the answer you're looking for? For example, In the ClassWriter class, a call is made to the set method of an Item object.