...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Bibliography
Wiki Markup |
---|
\[[JNI 2006|AA. Bibliography#JNI 06]\] \[[SCG 2007|AA. Bibliography#SCG 07]\] Guideline 3-3 Define wrappers around native methods \[[Liang 1997|AA. Bibliography#Liang 97]\] \[[Macgregor 1998|AA. Bibliography#Macgregor 98]\] Section 2.2.3, Interfaces and Architectures \[[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 111|http://cwe.mitre.org/data/definitions/111.html] "Direct Use of Unsafe JNI" |
...