Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The code that is not subject to bytecode verification can bypass security checks that are normally expected to be performed by Java code.

Rule Guideline

Severity

Likelihood

Remediation Cost

Priority

Level

ENV10- J

high

likely

low

P27

L1

...