CWE-1076 – Insufficient Adherence to Expected Conventions

Read Time:10 Second

Description

The product’s architecture, source code, design, documentation,
or other artifact does not follow required conventions.

Modes of Introduction:

 

 

Related Weaknesses

CWE-710

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References

CWE-1073 – Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses

Read Time:16 Second

Description

The software contains a client with a function or method that contains a large number of data accesses/queries that are sent through a data manager, i.e., does not use efficient database capabilities.

Modes of Introduction:

 

 

Related Weaknesses

CWE-405

 

Consequences

Other: Reduce Performance

 

Potential Mitigations

CVE References

CWE-1070 – Serializable Data Element Containing non-Serializable Item Elements

Read Time:13 Second

Description

The software contains a serializable, storable data element such as a field or member,
but the data element contains member elements that are not
serializable.

Modes of Introduction:

 

 

Related Weaknesses

CWE-710

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References

CWE-107 – Struts: Unused Validation Form

Read Time:26 Second

Description

An unused validation form indicates that validation logic is not up-to-date.

It is easy for developers to forget to update validation logic when they remove or rename action form mappings. One indication that validation logic is not being properly maintained is the presence of an unused validation form.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1164
CWE-20

 

Consequences

Other: Quality Degradation

 

Potential Mitigations

Phase: Implementation

Description: 

Remove the unused Validation Form from the validation.xml file.

CVE References

News, Advisories and much more

Exit mobile version