Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

By providing overridden implementations, an attacker can use untrusted code to glean sensitive information, run arbitrary code, or launch a denial of service attack.

See 10 MET52-J. Do not use the clone() method to copy untrusted method parameters for more specific details regarding overriding the Object.clone() method.

...