...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="78a7b1e99fc6d3d7-b5cc6616-413349fa-9a93a75a-7785ed76d03f12eca16c71ec"><ac:plain-text-body><![CDATA[ | [ISO/IEC TR 24772:2010 | http://www.aitcnet.org/isai/] | Cross-site Scripting scripting [XYT] | ]]></ac:plain-text-body></ac:structured-macro> |
CWE-289. Authentication Bypass bypass by Alternate Name alternate name | ||||
| CWE-180. Incorrect Behavior Orderbehavior order: Validate Before Canonicalize before canonicalize |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1fbd2b656bc1b4d2-d8a31dc0-487448af-a65ebb75-45ec428d5627936ac8d96e48"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0271ef85c8ef6c29-5f2a160a-42584647-8b1f8289-22466c98674db23f78136e59"><ac:plain-text-body><![CDATA[ | [[Davis 2008 | AA. Bibliography#Davis 08]] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="377e5f578e0cf775-74875d58-4feb4e6f-9aae874e-8eeda9d10a0f5d248b7a5214"><ac:plain-text-body><![CDATA[ | [[Weber 2009 | AA. Bibliography#Weber 09]] | ]]></ac:plain-text-body></ac:structured-macro> |
...