...
CWE-266. Incorrect privilege assignment | |
| CWE-272. Least privilege violation |
| CWE-732. Incorrect permission assignment for critical resource |
Secure Coding Guidelines for the Java Programming Language, Version 3.0 | Guideline 6-2. Safely invoke |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2df897aa-0cac-42c2-8b0b-0e4987242def"><ac:plain-text-body><![CDATA [ [[API 2006AA. References#API 06] ] | [Method | ]]></ac:plain-text-body></ac:structured-macro> | <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1b38065c-c4a5-4fdc-b912-44e5102b8458"><ac:plain-text-body><![CDATA[ |
[ [Gong 2003AA. References#Gong 03] ] | Sections 6.4, | ]]></ac:plain-text-body></ac:structured-macro> | <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a68a992c-71fd-44f0-b171-1ea8bce04105"><ac:plain-text-body><![CDATA[ |
[[Jovanovic 2006AA. References#Jovanovic 06]] | Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities ]]></ac:plain-text-body></ac:structured-macro> |
...