Category Archives: CWE

CWE-1100 – Insufficient Isolation of System-Dependent Functions

Read Time:10 Second

Description

The product or code does not isolate system-dependent
functionality into separate standalone modules.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1061

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References

CWE-1067 – Excessive Execution of Sequential Searches of Data Resource

Read Time:15 Second

Description

The software contains a data query against an SQL table or view
that is configured in a way that does not utilize an index and may cause
sequential searches to be performed.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1176

 

Consequences

Other: Reduce Performance

 

Potential Mitigations

CVE References

CWE-107 – Struts: Unused Validation Form

Read Time:26 Second

Description

An unused validation form indicates that validation logic is not up-to-date.

It is easy for developers to forget to update validation logic when they remove or rename action form mappings. One indication that validation logic is not being properly maintained is the presence of an unused validation form.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1164
CWE-20

 

Consequences

Other: Quality Degradation

 

Potential Mitigations

Phase: Implementation

Description: 

Remove the unused Validation Form from the validation.xml file.

CVE References

CWE-1070 – Serializable Data Element Containing non-Serializable Item Elements

Read Time:13 Second

Description

The software contains a serializable, storable data element such as a field or member,
but the data element contains member elements that are not
serializable.

Modes of Introduction:

 

 

Related Weaknesses

CWE-710

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References