...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="eeab78b1d30a09f6-6e608df5-4e2445bd-9a37a3a7-d5af51785d0f28a66b562d92"><ac:plain-text-body><![CDATA[ | [[McGraw 1998 | AA. Bibliography#Mcgraw 98]] | Twelve rules for developing more secure Java code | ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="703411e98ab3a772-200d16d5-472c45ca-8e27ae0d-e11bd1697743a97100ad8b85"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-498 | http://cwe.mitre.org/data/definitions/498.html]. Cloneable Class Containing Sensitive Information, class containing sensitive information; [CWE-491 | http://cwe.mitre.org/data/definitions/491.html]. Public | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1152dffbd2b70749-d64b5a5d-4cf24e98-a8528db4-f8341c2d64675a662e6b83ed"><ac:plain-text-body><![CDATA[ | [[Wheeler 2003 | AA. Bibliography#Wheeler 03]] | 10.6, Java | ]]></ac:plain-text-body></ac:structured-macro> |
...