...
| Include Page | ||||
|---|---|---|---|---|
|
Risk Assessment
While it is relatively rare for a violation of this rule to result in a security vulnerability, it could more easily result in loss or misinterpreted data.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
INT06-A | 1 (low) | 2 (low) | 2 (medium) | P2 | L3 |
References
| Wiki Markup |
|---|
\[[Klein 02|AA. C References#Klein 02]] \[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]] Sections 7.20.1.4, "The strtol, strtoll, strtoul, and strtoull functions," 7.20.1.2, "The atoi, atol, and atoll functions," and 7.19.6.7, "The sscanf function" |