...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="63582d7d-b25b-4f7b-afca-8f64b6f9816f"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE ID 111 | http://cwe.mitre.org/data/definitions/111.html] "Direct Use of Unsafe JNI" | ]]></ac:plain-text-body></ac:structured-macro> |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="83860fdfd0f857d9-af6b8b5f-4c8a41d5-ace2acb5-f8bd115cfaa888f487f24272"><ac:plain-text-body><![CDATA[ | [[Fairbanks 2007 | AA. Bibliography#Fairbanks 07]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bb513cf51a90b987-9316073d-4e5a4570-90878a3a-24e6f95ace843694105d7022"><ac:plain-text-body><![CDATA[ | [[JNI 2006 | AA. Bibliography#JNI 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="fedb9e1466e4bbd9-af29dcd5-4c8c40b6-9b30a155-b292a97c3aad200442324236"><ac:plain-text-body><![CDATA[ | [[Liang 1997 | AA. Bibliography#Liang 97]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="83e1099d3b6deb64-7a7041ae-4dc64bd2-bf39b7d6-36f40f5bd808a68d7dfb0691"><ac:plain-text-body><![CDATA[ | [[Macgregor 1998 | AA. Bibliography#Macgregor 98]] | Section 2.2.3, Interfaces and Architectures | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b1a10f5eb0f4940f-e06cdbe4-431c456e-a638b47d-c7ab3b35c50f614fbdde3293"><ac:plain-text-body><![CDATA[ | [[SCG 2009 | AA. Bibliography#SCG 09]] | Guideline 3-3 Define wrappers around native methods | ]]></ac:plain-text-body></ac:structured-macro> |
...