...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FLP32-C | 2 (medium) | 2 (probable) | 2 (medium) | P8 | L2 |
Examples of Search for vulnerabilities resulting from the violation of this rule can be found on the CERT website.
References
Wiki Markup |
---|
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 7.12, "Mathematics <math.h>" \[[Plum 91|AA. C References#Plum 91]\] Topic 2.10, "conv - conversions and overflow" |