...
The Java language system weakens the accessibility of sensitive, private entities in inner classes, which can result in a security weakness.
Recommendation Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
OBJ09-J | medium | probable | medium | P8 | L2 |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bdcee3678c74692c-ef0b8444-4c704154-b9488722-69500c6a8f9b5c5c07fae73e"><ac:plain-text-body><![CDATA[ | [[JLS 2005 | AA. Bibliography#JLS 05]] | [§8.1.3, Inner Classes and Enclosing Instances | http://java.sun.com/docs/books/jls/third_edition/html/classes.html#8.1.3] ]]></ac:plain-text-body></ac:structured-macro> |
| §8.3 "Field Declarations" | |||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="aa349bf333df932a-08cb267c-47d64288-9b758d3a-584dfd8f9ea87ffb7f2fef9c"><ac:plain-text-body><![CDATA[ | [[Long 2005 | AA. Bibliography#Long 05]] | §2.3, Inner Classes | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="5a5eda12db3ecb65-d6627722-40654f48-8916b21b-9a4d65c2ab32627ea6755e69"><ac:plain-text-body><![CDATA[ | [[McGraw 1999 | AA. Bibliography#McGraw 99]] | Securing Java, Getting Down to Business with Mobile Code | ]]></ac:plain-text-body></ac:structured-macro> |
...