...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
IDS16-J | medium | probable | medium | P8 | L2 |
Related
...
Guidelines
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup |
...
" ac:schema-version="1" ac:macro-id="f03f19df-c2be-422c-8e8e-04d780d8f190"><ac:plain-text-body><![CDATA[ | [[API |
...
2006 |
...
AA. |
...
Bibliography#API |
...
06] |
...
] |
...
Class |
...
| ]]></ac:plain-text-body></ac:structured-macro> |
...
IDS15-J. Use a subset of ASCII for file names IDS17-J. Use compatible encodings on both sides of file or network IO