• Skip to main content
  • assistive.skiplink.to.breadcrumbs
  • assistive.skiplink.to.header.menu
  • assistive.skiplink.to.action.menu
  • assistive.skiplink.to.quick.search
Log in
Confluence
  • Spaces
  • Hit enter to search
  • Help
    • Online Help
    • Keyboard Shortcuts
    • Feed Builder
    • What’s new
    • Available Gadgets
    • About Confluence
  • Log in

SEI CERT Oracle Coding Standard for Java
SEI CERT Oracle Coding Standard for Java
  • Pages
  • Boards

Space shortcuts

  • Dashboard
  • Secure Coding Home
  • Android
  • C
  • C++
  • Java
  • Perl
Browse pages
  • See content from all spaces
  • Popular Labels
  • All Labels

Labelled content

search
attachments
weblink
advanced
Overview
Content Tools
Related Labels
  • recommendation
  • num
  • cwe-494
  • sec
  • msc
  • dos
  • cwe-272
  • 5misconceptions
  • vna
  • thi
  • resource-exhaustion
  • cwe-770
  • tech-edit
  • 3reliability
  • dcl
  • defensive
  • review
  • out-of-scope
  • logging
  • malicious
  • review-rcs
  • cwe-582
  • outstanding
  • review-dms
  • android-applicable
Every content item in this list is tagged with all the required labels:
  • 1security
  • analyzable

To add a label to the list of required labels, choose '+ labelname' from Related Labels.
To remove a label from the required labels, choose '- labelname' from above.

  • Page:
    MET56-J. Do not use Object.equals() to compare cryptographic keys
    Oct 09, 2009 • Dhruv Mohindra
    • security
    • review-dms
    • review-dm
    • review-dfs
    • met
    • android-applicable
    • recommendation
    • 1security
    • analyzable
  • Page:
    MET52-J. Do not use the clone() method to copy untrusted method parameters
    Oct 01, 2009 • Dhruv Mohindra
    • security
    • review-dms
    • review-dm
    • review-dfs
    • reviewed-fwl
    • met
    • android-applicable
    • recommendation
    • 1security
    • analyzable
  • Page:
    SEC54-J. Create a secure sandbox using a security manager
    Jul 06, 2008 • Dhruv Mohindra
    • security
    • review-dms
    • review-dm
    • review-dfs
    • reviewed-fwl
    • sec
    • cwe-285
    • android-inapplicable
    • recommendation
    • 1security
    • analyzable
  • Page:
    SEC52-J. Do not expose methods that use reduced-security checks to untrusted code
    Jul 05, 2008 • Dhruv Mohindra
    • security
    • review-dms
    • review-dm
    • review-dfs
    • reviewed-fwl
    • sec
    • cwe-732
    • android-inapplicable
    • recommendation
    • 1security
    • analyzable
  • Powered by Atlassian Confluence 8.5.22
  • Printed by Atlassian Confluence 8.5.22
  • Report a bug
  • Atlassian News
Atlassian

Carnegie Mellon University
Software Engineering Institute
4500 Fifth Avenue
Pittsburgh, PA 15213-2612
412-268-5800

Contact Us
  • Office Locations|
  • Additional Sites Directory|
  • Legal|
  • Privacy Notice|
  • CMU Ethics Hotline|
  • www.sei.cmu.edu

©2023 Carnegie Mellon University

{"serverDuration": 101, "requestCorrelationId": "39e1170d58312469"}