...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
SEC30 SEC18- J | medium | probable | high | P4 | L3 |
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
References
Wiki Markup |
---|
\[[JNI 06|AA. Java References#JNI 06]\] \[[SCG 07|AA. Java References#SCG 07]\] Guideline 3-3 Define wrappers around native methods \[[Liang 97|AA. Java References#Liang 97]\] \[[Macgregor 98|AA. Java References#Macgregor 98]\] Section 2.2.3, Interfaces and Architectures \[[MITRE 09|AA. Java References#MITRE 09]\] [CWE ID 111|http://cwe.mitre.org/data/definitions/111.html] "Direct Use of Unsafe JNI" |
...