...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="c6d7e7f5-3930-4ff0-b537-95e4f1af0a03"><ac:plain-text-body><![CDATA[ | [[API |
...
2006 |
...
AA. |
...
Bibliography#API |
...
06] |
...
] |
...
[Class |
...
ClassLoader |
...
http://java.sun.com/javase/6/docs/api/java/lang/ClassLoader.html |
...
] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="99634f96-0974-4a3c-8025-4972d1abf139"><ac:plain-text-body><![CDATA[ | [[Oaks |
...
2001 |
...
AA. |
...
Bibliography#Oaks |
...
01]] |
| ] |
...
]></ac:plain-text-body></ac:structured-macro> | ||||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="16e2878a-ade7-4461-a588-83af8e7b18db"><ac:plain-text-body><![CDATA[ | [[Security 2006 | AA. Bibliography#Security 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
...
SEC09-J. Do not base security checks on untrusted sources 14. Platform Security (SEC) SEC12-J. Do not grant untrusted code access to classes in inaccessible packages