CWE-1086 – Class with Excessive Number of Child Classes

Read Time:9 Second

Description

A class contains an unnecessarily large number of
children.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1093

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References

CWE-1083 – Data Access from Outside Expected Data Manager Component

Read Time:16 Second

Description

The software is intended to manage data access through a particular data manager component such as a relational or non-SQL database, but it contains code that performs data access operations without using that component.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1061

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References

CWE-108 – Struts: Unvalidated Action Form

Read Time:50 Second

Description

Every Action Form must have a corresponding validation form.

If a Struts Action Form Mapping specifies a form, it must have a validation form defined under the Struts Validator.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1173
CWE-20

 

Consequences

Other: Other

If an action form mapping does not have a validation form defined, it may be vulnerable to a number of attacks that rely on unchecked input. Unchecked input is the root cause of some of today’s worst and most common software security problems. Cross-site scripting, SQL injection, and process control vulnerabilities all stem from incomplete or absent input validation.

Confidentiality, Integrity, Availability, Other: Other

Although J2EE applications are not generally susceptible to memory corruption attacks, if a J2EE application interfaces with native code that does not perform array bounds checking, an attacker may be able to use an input validation mistake in the J2EE application to launch a buffer overflow attack.

 

Potential Mitigations

Phase: Implementation

Description: 

CVE References

CWE-1077 – Floating Point Comparison with Incorrect Operator

Read Time:15 Second

Description

The code performs a comparison such as an
equality test between two float (floating point) values, but
it uses comparison operators that do not account for the
possibility of loss of precision.

Modes of Introduction:

 

 

Related Weaknesses

CWE-697

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References

News, Advisories and much more

Exit mobile version