Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup

...

" ac:schema-version="1" ac:macro-id="0a187e62-6934-4c89-b2cf-2ef7c535e52f"><ac:plain-text-body><![CDATA[

[[CVE

...

2008

...

AA.

...

Bibliography#CVE

...

08]

...

]

...

[CVE-2009-0783

...

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783

...

]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="559eedb4-c870-4e6c-a0f7-08f4a5ab27c2"><ac:plain-text-body><![CDATA[

[[Gong

...

2003

...

AA.

...

Bibliography#Gong

...

03]

...

]

...

Section

...

4.3.2,

...

Class

...

Loader

...

Delegation

...

Hierarchy

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2469f904-0475-4c81-8777-6d5a830accc4"><ac:plain-text-body><![CDATA[

[[JLS 2005

AA. Bibliography#JLS 05]]

Section 4.3.2,

...

"The

...

Class

...

Object"

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="018a1db8-e474-485d-954b-20c295f11e80"><ac:plain-text-body><![CDATA[

[[SCG 2007

AA. Bibliography#SCG 07]]

Guideline 6-2 Safely invoke standard APIs that bypass SecurityManager checks depending on the immediate caller's class loader

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="79e1a6c3-7389-4253-b6e2-ab14ed90d6d4"><ac:plain-text-body><![CDATA[

[[Tomcat 2009

AA. Bibliography#Tomcat 09]]

[Bug ID 29936

https://issues.apache.org/bugzilla/show_bug.cgi?id=29936],

...

API

...

Class

...

org.apache.tomcat.util.digester.Digester

...

,

...

[Security

...

fix

...

in

...

v

...

6.0.20

...

http://tomcat.apache.org/security-6.html]

]]></ac:plain-text-body></ac:structured-macro>

...

SEC03-J. Do not allow tainted variables in doPrivileged blocks      14. Platform Security (SEC)      SEC05-J. Do not expose standard APIs that use the immediate caller's class loader instance to untrusted code