...
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
OBJ06-J | medium high | unlikely | low | P6 | L2 |
Related Vulnerabilities
...
Bibliography
Wiki Markup |
---|
\[[Christudas 2005|AA. Bibliography#Christudas 05]\] \[[JVMSpec 1999|AA. Bibliography#JVMSpec 99]\] [§2.8.1 Class Names|http://java.sun.com/docs/books/jvms/second_edition/html/Concepts.doc.html] \[[Christudas 2005|AA. Bibliography#Christudas 05]\] \[[Mcgraw 1998|AA. Bibliography#Mcgraw 98]\] \[[WheelerMITRE 20032009|AA. Bibliography#WheelerBibliography#MITRE 0309]\] [JavaCWE ID 486|http://wwwcwe.dwheelermitre.comorg/secure-programs/Secure-Programs-HOWTO/javadata/definitions/486.html] "Comparison of Classes by Name" \[[MITREWheeler 20092003|AA. Bibliography#MITREBibliography#Wheeler 0903]\] [CWE ID 486Java|http://cwewww.mitredwheeler.orgcom/data/definitions/486secure-programs/Secure-Programs-HOWTO/java.html] "Comparison of Classes by Name" |
...
OBJ05-J. Limit the extensibility of non-final classes and methods to trusted subclasses only 08. Object Orientation (OBJ) OBJ07-J. Understand how a superclass can affect a subclass