...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d6204ae8c26843a1-beb36741-47b84652-84efbb88-98c825c0a1f5785fd25a3f08"><ac:plain-text-body><![CDATA[ | [[McGraw 1998 | AA. Bibliography#Mcgraw 98]] | Twelve rules for developing more secure Java code | ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9363583854f23a82-868b4c07-458640c9-a254ae45-9a432db6cd887505e3fd9022"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-498 | http://cwe.mitre.org/data/definitions/498.html]. Cloneable class containing sensitive information; [CWE-491 | http://cwe.mitre.org/data/definitions/491.html]. Public | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="21099ea5ffe772ef-0b6838cf-4fe443d7-9f6e8b34-9a41a896f83c8dde28896970"><ac:plain-text-body><![CDATA[ | [[Wheeler 2003 | AA. Bibliography#Wheeler 03]] | 10.6, Java | ]]></ac:plain-text-body></ac:structured-macro> |
...