Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

SEC36-J

??

??

??

P??

L??

Automated Detection

TODO

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.(h2. Ref)erences

References

Java Security, Scott Oaks pg. 50, The Bytecode Verifier
Enterprise Security: Building Secure J2EE Applications, 7.3 The Class File Verifier