CWE-1091 – Use of Object without Invoking Destructor Method

Read Time:12 Second

Description

The software contains a method that accesses an object but does not later invoke
the element’s associated finalize/destructor method.

Modes of Introduction:

 

 

Related Weaknesses

CWE-772
CWE-1076

 

Consequences

Other: Reduce Performance

 

Potential Mitigations

CVE References

CWE-109 – Struts: Validator Turned Off

Read Time:22 Second

Description

Automatic filtering via a Struts bean has been turned off, which disables the Struts Validator and custom validation logic. This exposes the application to other weaknesses related to insufficient input validation.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1173
CWE-20

 

Consequences

Access Control: Bypass Protection Mechanism

 

Potential Mitigations

Phase: Implementation

Description: 

Ensure that an action form mapping enables validation. Set the validate field to true.

CVE References

CWE-1083 – Data Access from Outside Expected Data Manager Component

Read Time:16 Second

Description

The software is intended to manage data access through a particular data manager component such as a relational or non-SQL database, but it contains code that performs data access operations without using that component.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1061

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References