...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0964eba8-c1ed-411e-87ca-718802ce6541"><ac:plain-text-body><![CDATA[ | AA. Bibliography#MITRE 09]] | http://cwe.mitre.org/data/definitions/319.html] "Cleartext Transmission of Sensitive Information" | ]]></ac:plain-text-body></ac:structured-macro>, "Cleartext Transmission of Sensitive Information" |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="52b4149c1f1e243f-96db884e-48df4fcc-8801bfbf-64c6135e57518e69347b90b5"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="f0ab2ce893ead12d-14370a5f-49be4ec6-9b4d8122-ed039f6f1fff3410523a8453"><ac:plain-text-body><![CDATA[ | [[Gong 2003 | AA. Bibliography#Gong 03]] | 9.10 Sealing Objects | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="12aa9ae08031d0af-64cb9e8e-4b2349aa-a4dc9789-013fa87fcbd63c56e30490ea"><ac:plain-text-body><![CDATA[ | [[Harold 1999 | AA. Bibliography#Harold 99]] | Chapter 11: Object Serialization, Sealed Objects | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a89a0552eae894d6-16bc08ee-4fe643a4-82079bdf-c085c425072ce45cc92fbc76"><ac:plain-text-body><![CDATA[ | [[Neward 2004 | AA. Bibliography#Neward 04]] | Item 64: Use SignedObject to provide integrity of Serialized objects | ]]></ac:plain-text-body></ac:structured-macro> |
| Item 65: Use SealedObject to provide confidentiality of Serializable objects | |||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b1d9da57734bd6d5-0c6d89d3-4e104780-b3c3a666-fca0ea118ec5730de8146e35"><ac:plain-text-body><![CDATA[ | [[Steel 2005 | AA. Bibliography#Steel 05]] | Chapter 10: Securing the Business Tier, Obfuscated Transfer Object | ]]></ac:plain-text-body></ac:structured-macro> |
...