Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This class can be exploited by a malicious class, shown in the following noncompliant code example, that subclasses the nonfinal non-final SensitiveClass and provides a public clone() method.

...