...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="0a187e62-6934-4c89-b2cf-2ef7c535e52f"><ac:plain-text-body><![CDATA[ | [[CVE |
...
2008 |
...
AA. |
...
Bibliography#CVE |
...
08] |
...
] |
...
[CVE-2009-0783 |
...
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783 |
...
] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="559eedb4-c870-4e6c-a0f7-08f4a5ab27c2"><ac:plain-text-body><![CDATA[ | [[Gong |
...
2003 |
...
AA. |
...
Bibliography#Gong |
...
03] |
...
] |
...
Section |
...
4.3.2, |
...
Class |
...
Loader |
...
Delegation |
...
Hierarchy | ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2469f904-0475-4c81-8777-6d5a830accc4"><ac:plain-text-body><![CDATA[ | [[JLS 2005 | AA. Bibliography#JLS 05]] | Section 4.3.2, |
...
"The |
...
Class |
...
| ]]></ac:plain-text-body></ac:structured-macro> | |||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="018a1db8-e474-485d-954b-20c295f11e80"><ac:plain-text-body><![CDATA[ | [[SCG 2007 | AA. Bibliography#SCG 07]] | Guideline 6-2 Safely invoke standard APIs that bypass SecurityManager checks depending on the immediate caller's class loader | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="79e1a6c3-7389-4253-b6e2-ab14ed90d6d4"><ac:plain-text-body><![CDATA[ | [[Tomcat 2009 | AA. Bibliography#Tomcat 09]] | [Bug ID 29936 | https://issues.apache.org/bugzilla/show_bug.cgi?id=29936], |
...
API |
...
Class |
...
|
...
, |
...
[Security |
...
fix |
...
in |
...
v |
...
6.0.20 |
...
http://tomcat.apache.org/security-6.html] | ]]></ac:plain-text-body></ac:structured-macro> |
...
SEC03-J. Do not allow tainted variables in doPrivileged blocks 14. Platform Security (SEC) SEC05-J. Do not expose standard APIs that use the immediate caller's class loader instance to untrusted code