...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="22afa8d8-a2ab-4fb0-8b62-894e010defbd"><ac:plain-text-body><![CDATA[ | [ISO/IEC TR 24772:2010 | http://www.aitcnet.org/isai/] | "Argument Passing to Library Functions [TRJ]" | ]]></ac:plain-text-body></ac:structured-macro> |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="54dda3ed4a632e38-4177b348-43bc4257-b1658a32-7a55a42fe410b2909adc4c15"><ac:plain-text-body><![CDATA[ | [[Bloch 2008 | AA. Bibliography#Bloch 08]] | Item 38: Check parameters for validity | ]]></ac:plain-text-body></ac:structured-macro> |
...