...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="641a836acf9c05a9-68ae965d-4c554dfd-b1789555-a3f203ad8082f3dcb6a8c122"><ac:plain-text-body><![CDATA[ | [[McGraw 1998 | AA. Bibliography#Mcgraw 98]] | Twelve rules for developing more secure Java code | ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e9a7273e6a756c25-aa4cf1f7-49be4839-b72c95ea-346bced7ae02219c08ff87de"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-498 | http://cwe.mitre.org/data/definitions/498.html]. Cloneable Class Containing Sensitive Information, class containing sensitive information; [CWE-491 | http://cwe.mitre.org/data/definitions/491.html]. Public | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="4130fcec9ea3aa2d-6189f368-474e4fce-a763b921-8b86732c3ad8d9d27c7f9529"><ac:plain-text-body><![CDATA[ | [[Wheeler 2003 | AA. Bibliography#Wheeler 03]] | 10.6, Java | ]]></ac:plain-text-body></ac:structured-macro> |
...