 
                            Rules
| Content by Label | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | 
Risk Assessment Summary
| Rule | Severity | Likelihood | Detectable | Repairable | Priority | Level | 
|---|---|---|---|---|---|---|
| VNA00-J | Medium | Probable | Yes | No | P8 | L2 | 
| VNA01-J | Low | Probable | Yes | No | P4 | L3 | 
| VNA02-J | Medium | Probable | Yes | No | P8 | L2 | 
| VNA03-J | Low | Probable | No | No | P2 | L3 | 
| VNA04-J | Low | Probable | Yes | No | P4 | L3 | 
| VNA05-J | Low | Unlikely | Yes | No | P2 | L3 | 
...
Guidelines
VNA00-J. Ensure visibility when accessing shared primitive variables
VNA01-J. Ensure visibility of shared references to immutable objects
VNA02-J. Ensure that compound operations on shared variables are atomic
VNA03-J. Do not assume that a group of calls to independently atomic methods is atomic
VNA04-J. Ensure that calls to chained methods are atomic
VNA05-J. Ensure atomicity when reading and writing 64-bit values
Risk Assessment Summary
| Guideline | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|
IDS18-J. Check that inputs do not produce excessive resource consumption The CERT Oracle Secure Coding Standard for Java