Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: updated risk assessment table

...

FIO02-J. Use Runtime.exec() correctly

FIO03-J. Reserved

FIO04-J. Understand the limitations of the logging framework

...

FIO07-J. Do not assume infinite heap space

Rules

FIO30-J. Reserved

FIO31-J. Create a copy of mutable inputs

...

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

FIO00-J

medium

probable

high

P4

L3

FIO01-J

high medium

probable unlikely

high medium

P6 P4

L2

L3

FIO02-J

medium

unlikely

medium

P4

L3

FIO03-J

TODO

TODO

TODO

TODO

TODO

FIO04-J

TODO

TODO

TODO

TODO

TODO

FIO05-J

TODO

TODO

TODO

TODO

TODO

FIO06 FIO02-J

high medium

probable

high

P6 P4

L2 L3

FIO06 FIO07-J

medium

probable

high

P4

L3

Rules

Rules

Severity

Likelihood

Remediation Cost

Priority

Level

FIO30-J

TODO

TODO

TODO

TODO

TODO

FIO31-J

medium

probable

high

P4

L3

FIO32-J

medium

likely

high

P6

L2

FIO33-J

high

probable

high

P6

L2

FIO34-J

low

probable

medium

P4

L3

FIO35-J

medium

unlikely

medium

P4

L3

FIO36-J

high

probable

medium

P12

L1

FIO37-J

medium

probable

high

P4

L3

...

OBJ35-J. Use checked collections against external code      The CERT Sun Microsystems Secure Coding Standard for Java      FIO00-J. Validate deserialized objects