...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
EXP33-A | 1 (low) | 1 (unlikely) | 2 (medium) | P2 | L3 |
Examples of vulnerabilities resulting from the violation of this rule can be found on the CERTwebsite.
References
Wiki Markup |
---|
\[[mercy|AA. C References#mercy]\] \[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 6.7.8, "Initialization" \[[Halvar|http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Flake.pdf]\] |