CWE-1091 – Use of Object without Invoking Destructor Method
Description The software contains a method that accesses an object but does not later invoke the element's associated finalize/destructor method. Modes of Introduction: ...
CWE-1092 – Use of Same Invokable Control Element in Multiple Architectural Layers
Description The software uses the same control element across multiple architectural layers. Modes of Introduction: Related Weaknesses CWE-710 Consequences Other: Reduce Maintainability...
CWE-1093 – Excessively Complex Data Representation
Description The software uses an unnecessarily complex internal representation for its data structures or interrelationships between those structures. Modes of Introduction: Related Weaknesses...
CWE-1094 – Excessive Index Range Scan for a Data Resource
Description The software contains an index range scan for a large data table, but the scan can cover a large number of rows. Modes of...
CWE-1095 – Loop Condition Value Update within the Loop
Description The software uses a loop with a control flow condition based on a value that is updated within the body of the loop. Modes...
CWE-1096 – Singleton Class Instance Creation without Proper Locking or Synchronization
Description The software implements a Singleton design pattern but does not use appropriate locking or other synchronization mechanism to ensure that the singleton class is...
CWE-1097 – Persistent Storable Data Element without Associated Comparison Control Element
Description The software uses a storable data element that does not have all of the associated functions or methods that are necessary to support comparison....
CWE-1098 – Data Element containing Pointer Item without Proper Copy Control Element
Description The code contains a data element with a pointer that does not have an associated copy or constructor method. Modes of Introduction: ...
CWE-1099 – Inconsistent Naming Conventions for Identifiers
Description The product's code, documentation, or other artifacts do not consistently use the same naming conventions for variables, callables, groups of related callables, I/O capabilities,...
CWE-11 – ASP.NET Misconfiguration: Creating Debug Binary
Description Debugging messages help attackers learn about the system and plan a form of attack. ASP .NET applications can be configured to produce debug binaries....