...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
SEC35-J | ?? | ?? | ?? | P?? | L?? |
Automated Detection
TODO
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.(h2. Ref)erences
References
Sun Secure Coding Guidelines
object.clone() http://java.sun.com/j2se/1.4.2/docs/api/java/lang/Object.html#clone()