 
                            ...
Many file-related vulnerabilities are exploited to cause a program to access an unintended file. Proper file identification is necessary to prevent exploitation.
| Recommendation | Severity | Likelihood | 
|---|
| Detectable | Repairable | Priority | Level | 
|---|---|---|---|
| FIO05-C | Medium | Probable | No | 
| No | 
| P4 | 
| L3 | 
Automated Detection
| Tool | Version | Checker | Description | 
|---|---|---|---|
| Compass/ROSE | 
| Could report possible violations of this rule merely by reporting any  | |||||||||
| LDRA tool suite | 
 | 44 S | Enhanced Enforcement | 
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
| SEI CERT C++ Coding Standard | VOID FIO05-CPP. Identify files using multiple file attributes | 
| ISO/IEC TR 24772:2013 | Path Traversal [EWR] | 
| MITRE CWE | CWE-37, Path issue—Slash absolute path CWE-38, Path Issue—Backslash absolute path CWE-39, Path Issue—Drive letter or Windows volume CWE-62, UNIX hard link CWE-64, Windows shortcut following (.LNK) CWE-65, Windows hard link | 
Bibliography
| [Drepper 2006] | Section 2.2.1 "Identification when Opening" | 
| [IEEE Std 1003.1:2013] | System Interfaces: openSystem Interfaces: fstat | 
| [Seacord 2013] | Chapter 8, "File I/O" | 
...
...