CWE-1120: Excessive Code Complexity
Description
The code is too complex, as calculated using a well-defined, quantitative measure.
Submission Date :
July 2, 2018, midnight
Modification Date :
2023-06-29 00:00:00+00:00
Organization :
MITRE
Extended Description
This issue makes it more difficult to understand and/or maintain the product, which indirectly affects security by making it more difficult or time-consuming to find and/or fix vulnerabilities. It also might make it easier to introduce vulnerabilities.
This issue can make the product perform more slowly. If the relevant code is reachable by an attacker, then this performance problem might introduce a vulnerability.
Related Weaknesses
This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined to give an overview of the different insight to similar items that may exist at higher and lower levels of abstraction.
CWE-710: Improper Adherence to Coding Standards
CWE-1047: Modules with Circular Dependencies
CWE-1056: Invokable Control Element with Variadic Parameters
CWE-1060: Excessive Number of Inefficient Server-Side Data Accesses
CWE-1064: Invokable Control Element with Signature Containing an Excessive Number of Parameters
CWE-1075: Unconditional Control Flow Transfer outside of Switch Block
CWE-1080: Source Code File with Excessive Number of Lines of Code
CWE-1095: Loop Condition Value Update within the Loop
CWE-1119: Excessive Use of Unconditional Branching
CWE-1121: Excessive McCabe Cyclomatic Complexity
CWE-1122: Excessive Halstead Complexity
CWE-1123: Excessive Use of Self-Modifying Code
CWE-1124: Excessively Deep Nesting
CWE-1125: Excessive Attack Surface
Visit http://cwe.mitre.org/ for more details.