Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: alphabetized references, changed severity to HIGH in compliance with David S's comment

...

Guideline

Severity

Likelihood

Remediation Cost

Priority

Level

OBJ06-J

medium high

unlikely

low

P6

L2

Related Vulnerabilities

...

Bibliography

Wiki Markup
\[[Christudas 2005|AA. Bibliography#Christudas 05]\]
\[[JVMSpec 1999|AA. Bibliography#JVMSpec 99]\] [§2.8.1 Class Names|http://java.sun.com/docs/books/jvms/second_edition/html/Concepts.doc.html]
\[[Christudas 2005|AA. Bibliography#Christudas 05]\]
\[[Mcgraw 1998|AA. Bibliography#Mcgraw 98]\]
\[[WheelerMITRE 20032009|AA. Bibliography#WheelerBibliography#MITRE 0309]\] [JavaCWE ID 486|http://wwwcwe.dwheelermitre.comorg/secure-programs/Secure-Programs-HOWTO/javadata/definitions/486.html] "Comparison of Classes by Name"
\[[MITREWheeler 20092003|AA. Bibliography#MITREBibliography#Wheeler 0903]\] [CWE ID 486Java|http://cwewww.mitredwheeler.orgcom/data/definitions/486secure-programs/Secure-Programs-HOWTO/java.html] "Comparison of Classes by Name"

...

OBJ05-J. Limit the extensibility of non-final classes and methods to trusted subclasses only      08. Object Orientation (OBJ)      OBJ07-J. Understand how a superclass can affect a subclass