...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...
Bibliography
Wiki Markup |
---|
\[[API 2006|AA. Bibliography#API 06]\] \[[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 327|http://cwe.mitre.org/data/definitions/327.html] "Use of a Broken or Risky Cryptographic Algorithm" |
...