...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Bibliography
Wiki Markup |
---|
\[[API 2006|AA. Bibliography#API 06]\] [Class SecurityManager|http://java.sun.com/javase/6/docs/api/java/lang/SecurityManager.html] \[[Oaks 2001|AA. Bibliography#Oaks 01]\] Chapter 5: The Access Controller, "Permissions" \[[Policy 2002|AA. Bibliography#Policy 02]\] \[[Sun 2006|AA. Bibliography#Sun 06]\] [Permission Descriptions and Risks|http://java.sun.com/javase/6/docs/technotes/guides/security/permissions.html] \[[MITRE 2007|AA. Bibliography#MITRE 07]\] [CWE-732|http://cwe.mitre.org/data/definitions/732.html], "Incorrect Permission Assignment for Critical Resource" |
...