...
CON24-J. Use a unique channel to acquire locks on any file
CON25-J. Ensure atomicity when reading and writing 64-bit values
Risk Assessment Summary
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
CON00-J | medium | probable | medium | P8 | L2 |
CON01-J | medium | probable | medium | P8 | L2 |
CON02-J | low | likely | high | P3 | L3 |
CON03-J | low | probable | medium | P4 | L3 |
CON04-J | low | probable | medium | P4 | L3 |
CON05-J | low | probable | medium | P4 | L3 |
CON06-J | low | probable | medium | P4 | L3 |
CON07-J | low | likely | high | P3 | L3 |
CON08-J | low | likely | high | P3 | L3 |
CON09-J | low | probable | medium | P4 | L3 |
CON10-J | low | probable | medium | P4 | L3 |
CON11-J | low | likely | high | P3 | L3 |
CON12-J | low | probable | medium | P4 | L3 |
CON14-J | low | probable | medium | P4 | L3 |
CON15-J | low | likely | low | P9 | L2 |
CON16-J | low | probable | medium | P4 | L3 |
CON17-J | low | probable | low | P6 | L2 |
CON18-J | low | unlikely | medium | P2 | L3 |
CON19-J | low | unlikely | medium | P2 | L3 |
CON20-J | low | probable | high | P2 | L3 |
CON21-J | low | probable | high | P2 | L3 |
CON22-J | low | probable | medium | P4 | L3 |
CON23-J | low | unlikely | medium | P2 | L3 |
CON24-J | low | unlikely | medium | P2 | L3 |
CON25-J | low | unlikely | medium | P2 | L3 |
...
IDS17-J. Understand how escape characters are interpreted when String literals are compiled The CERT Sun Microsystems Secure Coding Standard for Java CON00-J. Synchronize access to shared mutable variables