...
Risk Assessment Summary
Recommendations
Recommendation Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
EXC00- J | low | probable | medium | P4 | L3 |
EXC01- J | medium | probable likely | high | P4 P6 | L3 L2 |
EXC02- J | medium low | likely unlikely | high medium | P6 P2 | L2 L3 |
EXC03- J | low | unlikely probable | medium low | P2 P6 | L3 L2 |
EXC04- J | low | unlikely probable | medium | P2 P4 | L3 |
EXC05- J | medium low | likely unlikely | high medium | P6 P2 | L2 L3 |
EXC06- J | low medium | unlikely probable | high | P1 P4 | L3 |
EXC07- J | low medium | probable likely | high | P2 P6 | L3 L2 |
EXC08- J | low | probable unlikely | low medium | P6 P2 | L2 L3 |
EXC09- J | medium low | unlikely | medium | P4 P2 | L3 |
EXC10- J | low | unlikely | medium high | P2 P1 | L3 |
Rules
Rules | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
EXC30 EXC11- J | low | probable | medium high | P4 P2 | L3 |
EXC31 EXC12- J | low medium | unlikely probable | medium | P2 P8 | L3 L2 |
EXC32 EXC13- J | low | likely | medium | P6 | L2 |
EXC33 EXC14- J | low | likely | medium | P6 | L2 |
EXC34 EXC15- J | medium | probable unlikely | medium | P8 P4 | L2 L3 |
...
MET08-J. Do not use the clone method to copy untrusted method parameters The CERT Sun Microsystems Secure Coding Standard for Java EXC00-J. Do not suppress or ignore checked exceptions