Read Time:12 Second

Description

The source code uses literal constants that may need to change
or evolve over time, instead of using symbolic constants.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1078

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References