Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: synced risk tables

...

MET16-J. Ensure that the clone method calls super.clone

Risk Assessment Summary

...

Guideline

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

MET00- J

low

unlikely

medium high

P2 P1

L3

MET01- J

low

unlikely

high

P1

L3

MET02- J

low medium

unlikely probable

high medium

P1 P8

L3 L2

MET03- J

low medium

unlikely probable

high medium

P1 P8

L3 L2

MET04- J

medium

probable

medium

P8

L2

MET05- J

medium low

probable unlikely

medium high

P8 P1

L2 L3

MET06- J

medium high

probable

medium

P8 P12

L2

Rules

L1

MET07

Rules

Severity

Likelihood

Remediation Cost

Priority

Level

MET30- J

low medium

unlikely probable

medium low

P2 P12

L3 L1

MET31 MET08- J

low high

unlikely likely

high low

P1 P27

L3 L1

MET32 MET09- J

medium

probable

medium

P8

L2

MET33 MET10- J

low

unlikely

high

P1

L3

MET34 MET11- J

medium low

unlikely

medium

P4 P2

L3

MET36 MET12- J

high low

likely unlikely

medium

P18 P2

L1 L3

MET37 MET13- J

high low

probable unlikely

medium high

P12 P1

L1 L3

MET38 MET14- J

medium

probable unlikely

low medium

P12 P4

L1 L3

MET39 MET15- J

high

likely

low medium

P27 P18

L1

...

CON16-J. Do not expect sleep() and yield() methods to have any synchronization semantics      The CERT Sun Microsystems Secure Coding Standard for Java      MET11-J. Understand the difference between overriding and hiding