All posts by rocco

CWE-1073 – Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses

Read Time:16 Second

Description

The software contains a client with a function or method that contains a large number of data accesses/queries that are sent through a data manager, i.e., does not use efficient database capabilities.

Modes of Introduction:

 

 

Related Weaknesses

CWE-405

 

Consequences

Other: Reduce Performance

 

Potential Mitigations

CVE References

CWE-1077 – Floating Point Comparison with Incorrect Operator

Read Time:15 Second

Description

The code performs a comparison such as an
equality test between two float (floating point) values, but
it uses comparison operators that do not account for the
possibility of loss of precision.

Modes of Introduction:

 

 

Related Weaknesses

CWE-697

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References

CWE-108 – Struts: Unvalidated Action Form

Read Time:50 Second

Description

Every Action Form must have a corresponding validation form.

If a Struts Action Form Mapping specifies a form, it must have a validation form defined under the Struts Validator.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1173
CWE-20

 

Consequences

Other: Other

If an action form mapping does not have a validation form defined, it may be vulnerable to a number of attacks that rely on unchecked input. Unchecked input is the root cause of some of today’s worst and most common software security problems. Cross-site scripting, SQL injection, and process control vulnerabilities all stem from incomplete or absent input validation.

Confidentiality, Integrity, Availability, Other: Other

Although J2EE applications are not generally susceptible to memory corruption attacks, if a J2EE application interfaces with native code that does not perform array bounds checking, an attacker may be able to use an input validation mistake in the J2EE application to launch a buffer overflow attack.

 

Potential Mitigations

Phase: Implementation

Description: 

CVE References