...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
OBJ07-J | medium | probable | medium | P8 | L2 |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="4b1730e4-5d65-412a-b672-74fe1942d025"><ac:plain-text-body><![CDATA [ [[McGraw 1998AA. References#Mcgraw 98]] | Twelve rules for developing more secure Java code | ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="facead91-50cb-4e8f-a24f-98421a4c82c3"><ac:plain-text-body><![CDATA [ [[MITRE 2009AA. References#MITRE 09] ] | [CWE-498http://cwe.mitre.org/data/definitions/498. html]. Cloneable class containing sensitive information; [CWE-491http://cwe.mitre. org/data/definitions/491.html]. Public | ]]></ac:plain-text-body></ac:structured-macro> | <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9a23cd90-35c9-4e44-8f72-a347d7fd7338"><ac:plain-text-body><![CDATA[ |
[[Wheeler 2003AA. References#Wheeler 03]] | 10.6, Java ]]></ac:plain-text-body></ac:structured-macro> |
...