...
Rules | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
MET30- J | low | unlikely | medium | P2 | L3 |
MET31- J | low | unlikely | high | P1 | L3 |
MET32- J | medium | probable | medium | P8 | L2 |
MET33- J | low | unlikely | high | P1 | L3 |
MET34- J | medium | unlikely | medium | P4 | L3 |
MET36-J | high | likely | medium | P18 | L1 |
MET37- J | high | probable | medium | P12 | L1 |
MET38- J | medium | probable | low | P12 | L1 |
MET39-J | high | likely | low | P27 | L1 |
...
CON39-J. Ensure atomicity of 64-bit operations The CERT Sun Microsystems Secure Coding Standard for Java MET00-J. Understand the difference between overriding and hiding