...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="260d3a8324ed7ff2-b9b631bd-426e4cfc-a1bab230-70515e083845c9923bfea458"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE 272 | http://cwe.mitre.org/data/definitions/272.html] "Least Privilege Violation" | ]]></ac:plain-text-body></ac:structured-macro> |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="aaf03caf25620db2-c7fc715f-45ff49bd-98bdbfcd-b3f530a36565f6ec43384f28"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] | Class | ]]></ac:plain-text-body></ac:structured-macro> |
...
SEC09SEC01-J. Do not rely on the default automatic signature verification provided by URLClassLoader and java.util.jarallow tainted variables in doPrivileged blocks 14. Platform Security (SEC) 15. Runtime Environment (ENV)SEC03-J. Protect sensitive operations with security manager checks