...
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
CON00- J | medium | probable | medium | P8 | L2 |
CON01- J | medium | probable | medium | P8 | L2 |
CON02- J | low | likely | high | P3 | L3 |
CON03- J | low | probable | medium | P4 | L3 |
CON04- J | low | probable | medium | P4 | L3 |
CON05- J | low | probable | medium | P4 | L3 |
CON06- J | low | probable | medium | P4 | L3 |
CON07- J | low | likely | high | P3 | L3 |
CON08- J | low | likely | high | P3 | L3 |
CON09- J | low | probable | medium | P4 | L3 |
CON10- J | low | probable | medium | P4 | L3 |
CON11- J | low | likely | high | P3 | L3 |
CON12- J | low | probable | medium | P4 | L3 |
CON14- J | low | probable | medium | P4 | L3 |
CON15- J | low | likely | low | P9 | L2 |
CON16- J | low | probable | medium | P4 | L3 |
CON17- J | low | probable | low | P6 | L2 |
CON18- J | low | unlikely | medium | P2 | L3 |
CON19- J | low | unlikely | medium | P2 | L3 |
CON20- J | low | probable | high | P2 | L3 |
CON21- J | low | probable | high | P2 | L3 |
CON22- J | low | probable | medium | P4 | L3 |
CON23- J | low | unlikely | medium | P2 | L3 |
...
IDS05IDS17-J. Library methods should validate their parametersUnderstand how escape characters are interpreted when String literals are compiled The CERT Sun Microsystems Secure Coding Standard for Java CON07CON00-J. Do not invoke a superclass method or constructor from a synchronized region in the subclassSynchronize access to shared mutable variables