Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This compliant solution creates a defensive copy of the mutable date object in the readObject() method. Note the use of field-by-field input and validation of incoming fields (see guideline rule void SER04-J. Validate deserialized objects for additional information). Additionally, note that this compliant solution is insufficient to protect sensitive data (see guideline rule SER03-J. Do not serialize unencrypted, sensitive data for additional information).

...

Search for vulnerabilities resulting from the violation of this guideline rule on the CERT website.

Bibliography

...