...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1d41673bb7c09d0c-728ca106-4fda4b7f-be2cad7a-da92ed6f2e1c01af73344b20"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-259 | http://cwe.mitre.org/data/definitions/259.html] "Use of Hard-coded Password" | ]]></ac:plain-text-body></ac:structured-macro> |
| CWE-798 "Use of Hard-coded Credentials" |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="3beec3bc009ef496-4bd9bfac-416347dc-862981ab-d416dd66b4a3d9f6be8487f5"><ac:plain-text-body><![CDATA[ | [[Chess 2007 | AA. Bibliography#Chess 07]] | 11.2 Outbound Passwords: Keep Passwords out of Source Code | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b268e9e16831e9b8-cde07868-488344a5-9cfc94fd-05856a2d9e7c60676a68a52e"><ac:plain-text-body><![CDATA[ | [[Fortify 2008 | AA. Bibliography#Fortify 08]] | "Unsafe Mobile Code: Database Access" | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0c627091f992ec40-2bb2e28b-494a459b-80368309-e633290058bac1cc5b48003e"><ac:plain-text-body><![CDATA[ | [[Gong 2003 | AA. Bibliography#Gong 03]] | 9.4 Private Object State and Object Immutability | ]]></ac:plain-text-body></ac:structured-macro> |
...
49. Miscellaneous (MSC) MSC05MSC04-J. Store passwords using a hash function