...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
Related Guidelines
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="0b17f2a4-4dd7-40f7-ba9b-e9ceb8e0eea1"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE 272 | http://cwe.mitre.org/data/definitions/272.html] |
...
"Least |
...
Privilege |
...
Violation" | ]]></ac:plain-text-body></ac:structured-macro> |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1ed3df2d-c84a-473b-97d1-1471bd711320"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] | Class | ]]></ac:plain-text-body></ac:structured-macro> |
...
SEC19-J. Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jar 14. Platform Security (SEC) 15. Runtime Environment (ENV)