...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="138474f2-67ec-4e9b-b3bd-4a01b1674eb8"><ac:plain-text-body><![CDATA[ | [[CVE |
...
2008 |
...
AA. |
...
Bibliography#CVE |
...
08] |
...
] |
...
[CVE-2009-0783 |
...
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783 |
...
] | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9d3c3a9f-f9ab-4967-8bdc-6d2587f1d033"><ac:plain-text-body><![CDATA[ | [[Gong |
...
2003 |
...
AA. |
...
Bibliography#Gong |
...
03] |
...
] |
...
Section |
...
4.3.2, |
...
Class |
...
Loader |
...
Delegation |
...
Hierarchy | ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="71bbca28-98f8-46be-a9f9-f3f94fc4251f"><ac:plain-text-body><![CDATA[ | [[JLS 2005 | AA. Bibliography#JLS 05]] | Section 4.3.2, |
...
"The |
...
Class |
...
| ]]></ac:plain-text-body></ac:structured-macro> | |||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c1e27ad8-9c48-46e1-a8c5-d697903a650d"><ac:plain-text-body><![CDATA[ | [[SCG 2007 | AA. Bibliography#SCG 07]] | Guideline 6-2 Safely invoke standard APIs that bypass SecurityManager checks depending on the immediate caller's class loader | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="47780282-2a17-4acd-86e4-71f113fb9dba"><ac:plain-text-body><![CDATA[ | [[Tomcat 2009 | AA. Bibliography#Tomcat 09]] | [Bug ID 29936 | https://issues.apache.org/bugzilla/show_bug.cgi?id=29936], |
...
API |
...
Class |
...
|
...
, |
...
[Security |
...
fix |
...
in |
...
v |
...
6.0.20 |
...
http://tomcat.apache.org/security-6.html] | ]]></ac:plain-text-body></ac:structured-macro> |
...
SEC03-J. Do not allow tainted variables in doPrivileged blocks 14. Platform Security (SEC) SEC05-J. Do not expose standard APIs that use the immediate caller's class loader instance to untrusted code