...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FIO31 FIO00- J | medium | probable | high | P4 | L3 |
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
References
Wiki Markup |
---|
\[[SCG 07|AA. Java References#SCG 07]\] Guideline 2-1 Create a copy of mutable inputs and outputs \[[Bloch 08|AA. Java References#Bloch 08]\] Item 39: Make defensive copies when needed \[[Pugh 09|AA. Java References#Pugh 09]\] Returning references to internal mutable state |
...