...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="4a097fcd1021d035-e3113e3d-441c42d1-83628f08-6e1afb2b9e7b687054bedf6b"><ac:plain-text-body><![CDATA[ | [[McGraw 1998 | AA. Bibliography#Mcgraw 98]] | Twelve rules for developing more secure Java code | ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="80abcc955a66abc3-b2c8e415-4d314cd0-a6099c37-fa7f5421b4b1588e77785dc8"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-498 | http://cwe.mitre.org/data/definitions/498.html]. Cloneable class containing sensitive information; [CWE-491 | http://cwe.mitre.org/data/definitions/491.html]. Public | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="35de9f2cc751965f-38c8d8d6-42ff4f3b-b08982c1-9fdb464cd02766c22c28d901"><ac:plain-text-body><![CDATA[ | [[Wheeler 2003 | AA. Bibliography#Wheeler 03]] | 10.6, Java | ]]></ac:plain-text-body></ac:structured-macro> |
...