Read Time:13 Second

Description

The source code uses symbolic constants, but it does not
sufficiently place the definitions of these constants into a more centralized or
isolated location.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1078

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References