Labelled content
Every content item in this list is tagged with all the required labels:
To add a label to the list of required labels, choose '+ labelname' from Related Labels.
To remove a label from the required labels, choose '- labelname' from above.
-
SER13-J. Deserialization methods should not perform potentially dangerous operations (SEI CERT Oracle Coding Standard for Java)
-
SER12-J. Prevent deserialization of untrusted data (SEI CERT Oracle Coding Standard for Java)
-
SER09-J. Do not invoke overridable methods from the readObject() method (SEI CERT Oracle Coding Standard for Java)
-
SER01-J. Do not deviate from the proper signatures of serialization methods (SEI CERT Oracle Coding Standard for Java)
-
SER08-J. Minimize privileges before deserializing from a privileged context (SEI CERT Oracle Coding Standard for Java)
-
SER07-J. Do not use the default serialized form for classes with implementation-defined invariants (SEI CERT Oracle Coding Standard for Java)
-
SER11-J. Prevent overwriting of externalizable objects (SEI CERT Oracle Coding Standard for Java)
-
SER06-J. Make defensive copies of private mutable components during deserialization (SEI CERT Oracle Coding Standard for Java)
-
SER10-J. Avoid memory and resource leaks during serialization (SEI CERT Oracle Coding Standard for Java)
-
SER05-J. Do not serialize instances of inner classes (SEI CERT Oracle Coding Standard for Java)