Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Other Languages

This rule appears in the C++ Secure Coding Standard as ARR40-CPP. Use a valid ordering rule.

Related Guidelines

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6af93213ddbfff4e-8c9046e6-4de24fdd-bdb9b953-fbb23cdda7cdee86540e8fdf"><ac:plain-text-body><![CDATA[

[[MITRE 2009

AA. Bibliography#MITRE 09]]

[CWE-573

http://cwe.mitre.org/data/definitions/573.html] "Improper Following of Specification by Caller"

]]></ac:plain-text-body></ac:structured-macro>

CERT C Secure Coding Standard

FIO04-C. Detect and handle input and output errors

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="c01c43ff082fae8d-0e5f92f1-4e6b4272-84b9aeb2-e9461bdde57d3fdd80440d0a"><ac:plain-text-body><![CDATA[

[[API 2006

AA. Bibliography#API 06]]

method [compareTo()

http://java.sun.com/javase/6/docs/api/java/lang/Comparable.html#compareTo(java.lang.Object)]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="f7caff48a2305d26-65b5aaa5-40e44285-99e2af79-8dd1e75f44499c720fa05482"><ac:plain-text-body><![CDATA[

[[JLS 2005

AA. Bibliography#JLS 05]]

 

]]></ac:plain-text-body></ac:structured-macro>

...