...
Additionally, hostile code from any other package can exploit this vulnerability if the class is accessible. (For more information, see the guideline CON04-J. Synchronize using an internal private final lock object.)
...
For more information on using an Object
as a lock, see the guideline CON04-J. Synchronize using an internal private final lock object.
...