...
Detecting violations of this rule is straightforward.
Related
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
CWE ID 487, "Reliance on Package-level Scope" | |
Guideline 1-1 Limit the accessibility of classes, interfaces, methods, and fields |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="807855e6980facd9-d3d03743-46cb4ca3-8d2aa158-4e2865a0c9eb9cc64d76bb17"><ac:plain-text-body><![CDATA[ | [[JLS 2005 | AA. Bibliography#JLS 05]] | [Section 8.4.8.3 | http://java.sun.com/docs/books/jls/third_edition/html/classes.html#8.4.8.3], "Requirements in Overriding and Hiding" | ]]></ac:plain-text-body></ac:structured-macro> |
...