CWE-1068 – Inconsistency Between Implementation and Documented Design

Read Time:10 Second

Description

The implementation of the product is not consistent with the
design as described within the relevant documentation.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-710

 

Consequences

 

Potential Mitigations

CVE References

CWE-1067 – Excessive Execution of Sequential Searches of Data Resource

Read Time:15 Second

Description

The software contains a data query against an SQL table or view
that is configured in a way that does not utilize an index and may cause
sequential searches to be performed.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1176

 

Consequences

Other: Reduce Performance

 

Potential Mitigations

CVE References

CWE-1065 – Runtime Resource Management Control Element in a Component Built to Run on Application Servers

Read Time:15 Second

Description

The application uses deployed components from application servers, but it also uses low-level functions/methods for management of resources, instead of the API provided by the application server.

Modes of Introduction:

 

 

Related Weaknesses

CWE-710

 

Consequences

Other: Reduce Reliability

 

Potential Mitigations

CVE References

CWE-1064 – Invokable Control Element with Signature Containing an Excessive Number of Parameters

Read Time:11 Second

Description

The software contains a function, subroutine, or method whose signature has an unnecessarily large number of
parameters/arguments.

Modes of Introduction:

 

 

Related Weaknesses

CWE-1120

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References

CWE-1061 – Insufficient Encapsulation

Read Time:17 Second

Description

The software does not sufficiently hide the internal representation and implementation details of data or methods, which might allow external components or modules to modify data unexpectedly, invoke unexpected functionality, or introduce dependencies that the programmer did not intend.

Modes of Introduction:

 

 

Related Weaknesses

CWE-710

 

Consequences

 

Potential Mitigations

CVE References

CWE-106 – Struts: Plug-in Framework not in Use

Read Time:25 Second

Description

When an application does not use an input validation framework such as the Struts Validator, there is a greater risk of introducing weaknesses related to insufficient input validation.

Modes of Introduction:

– Implementation

 

 

Related Weaknesses

CWE-1173
CWE-20

 

Consequences

Integrity: Unexpected State

 

Potential Mitigations

Phase: Architecture and Design

Description: 

Use an input validation framework such as Struts.

Phase: Architecture and Design

Description: 

Use an input validation framework such as Struts.

Phase: Implementation

Description: 

Phase: Implementation

Description: 

CVE References

News, Advisories and much more

Exit mobile version