• Skip to main content
  • assistive.skiplink.to.breadcrumbs
  • assistive.skiplink.to.header.menu
  • assistive.skiplink.to.action.menu
  • assistive.skiplink.to.quick.search
Log in
Confluence
  • Spaces
  • Hit enter to search
  • Help
    • Online Help
    • Keyboard Shortcuts
    • Feed Builder
    • What’s new
    • Available Gadgets
    • About Confluence
  • Log in

SEI CERT Oracle Coding Standard for Java
SEI CERT Oracle Coding Standard for Java
  • Pages
  • Boards

Space shortcuts

  • Dashboard
  • Secure Coding Home
  • Android
  • C
  • C++
  • Java
  • Perl
Browse pages
  • See content from all spaces
  • Popular Labels
  • All Labels

Labelled content

search
attachments
weblink
advanced
Overview
Content Tools
Related Labels
  • cwe-78
  • num
  • recommendation
  • cwe-494
  • msc
  • dos
  • cwe-798
  • cwe-272
  • vna
  • cwe-191
  • thi
  • resource-exhaustion
  • cwe-770
  • 3reliability
  • dcl
  • review
  • logging
  • malicious
  • review-rcs
  • review-dms
  • deprecated
  • android-applicable
  • recommendation-list
  • new
  • cwe-807
Every content item in this list is tagged with all the required labels:
  • android
  • android-implementation-detail-java
  • sec

To add a label to the list of required labels, choose '+ labelname' from Related Labels.
To remove a label from the required labels, choose '- labelname' from above.

  • Page:
    SEC02-J. Do not base security checks on untrusted sources
    Oct 03, 2009 • Dhruv Mohindra
    • sec
    • cwe-807
    • android
    • rule
    • android-implementation-detail-java
    • cwe-362
  • Page:
    SEC01-J. Do not allow tainted variables in privileged blocks
    Aug 13, 2009 • Dhruv Mohindra
    • sec
    • cwe-732
    • android
    • least-privilege
    • cwe-266
    • cwe-272
    • rule
    • android-implementation-detail-java
    • analyzable
  • Page:
    SEC05-J. Do not use reflection to increase accessibility of classes, methods, or fields
    Jul 06, 2008 • Dhruv Mohindra
    • sec
    • android
    • rule
    • android-implementation-detail-java
  • Page:
    SEC03-J. Do not load trusted classes after allowing untrusted code to load arbitrary classes
    Jul 05, 2008 • Dhruv Mohindra
    • sec
    • cwe-732
    • needs-verification
    • android
    • normative
    • rule
    • android-implementation-detail-java
    • tech-edit-done
  • Powered by Atlassian Confluence 8.5.21
  • Printed by Atlassian Confluence 8.5.21
  • Report a bug
  • Atlassian News
Atlassian

Carnegie Mellon University
Software Engineering Institute
4500 Fifth Avenue
Pittsburgh, PA 15213-2612
412-268-5800

Contact Us
  • Office Locations|
  • Additional Sites Directory|
  • Legal|
  • Privacy Notice|
  • CMU Ethics Hotline|
  • www.sei.cmu.edu

©2023 Carnegie Mellon University

{"serverDuration": 71, "requestCorrelationId": "d44613119af5b0c6"}