...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="f287aa83badeac1b-9662f5f4-4ab344d9-8b8ca8fb-e8bd606767355c1725793c48"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> | |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="8edc2ca8a4811224-14287a58-45ea4876-95c6b0e4-687253b8b34afd3e4a5aaaa0"><ac:plain-text-body><![CDATA[ | [[CVE | AA. Bibliography#CVE]] | [CVE-2008-5353 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353] | ]]></ac:plain-text-body></ac:structured-macro> |
...