Guidelines
Content by Label | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Recommendations
IDS00-J. Always validate user input
IDS01-J. Prefer using URIs to URLs
IDS02-J. Perform loss less conversion of String to given encoding and back
IDS03-J. Prevent OS Command Injection
IDS04-J. Prevent against SQL Injection
IDS05-J. Prevent XML Injection
IDS06-J. Prevent XPath Injection
IDS07-J. Understand how escape characters are interpreted when String literals are compiled
IDS08-J. Sanitize before processing or storing user input
IDS09-J. Account for supplementary and combining characters in globalized code
IDS10-J. Validate strings after performing normalization
IDS11-J. Do not delete non-character code points
IDS12-J. Prevent XML external entity attacks
IDS13-J. Properly encode or escape output
IDS14-J. Do not use locale dependent methods on locale insensitive data
IDS15-J. Library methods should validate their parameters
SDV16-J. Prevent against LDAP injection
SDV17-J. Prevent against code injection
Risk Assessment Summary
Recommendations
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
SDV00- J | medium | unlikely | medium | P4 | L3 |
OBJ38-J. Immutable classes must prohibit extension The CERT Sun Microsystems Secure Coding Standard for Java FIO00-J. Canonicalize path names originating from untrusted sources