Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup

...

" ac:schema-version="1" ac:macro-id="c6d7e7f5-3930-4ff0-b537-95e4f1af0a03"><ac:plain-text-body><![CDATA[

[[API

...

2006

...

AA.

...

Bibliography#API

...

06]

...

]

...

[Class

...

ClassLoader

...

http://java.sun.com/javase/6/docs/api/java/lang/ClassLoader.html

...

]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="99634f96-0974-4a3c-8025-4972d1abf139"><ac:plain-text-body><![CDATA[

[[Oaks

...

2001

...

AA.

...

Bibliography#Oaks

...

01]]

 

]

...

]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="16e2878a-ade7-4461-a588-83af8e7b18db"><ac:plain-text-body><![CDATA[

[[Security 2006

AA. Bibliography#Security 06]]

 

]]></ac:plain-text-body></ac:structured-macro>

...

SEC09-J. Do not base security checks on untrusted sources      14. Platform Security (SEC)      SEC12-J. Do not grant untrusted code access to classes in inaccessible packages