Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Edited by NavBot (vkp) v1.0

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

...

Bibliography

Wiki Markup
\[[JNI 2006|AA. Bibliography#JNI 06]\]
\[[SCG 2007|AA. Bibliography#SCG 07]\] Guideline 3-3 Define wrappers around native methods
\[[Liang 1997|AA. Bibliography#Liang 97]\]
\[[Macgregor 1998|AA. Bibliography#Macgregor 98]\] Section 2.2.3, Interfaces and Architectures
\[[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 111|http://cwe.mitre.org/data/definitions/111.html] "Direct Use of Unsafe JNI"

...