...
Any vulnerabilities resulting from the violation of this rule are listed on the CERT website.
Related Guidelines
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="8546b8da-e784-4300-85d9-6574f849f616"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-820 | http://cwe.mitre.org/data/definitions/820.html] "Missing Synchronization" | ]]></ac:plain-text-body></ac:structured-macro> |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1406d174dc2fdca6-9c56e20f-4a9a4b49-94eca9d6-62792f940ca589c60bed02c8"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="87059714808277c0-acc93501-40ed4263-bebda077-acb7ded399f595ba439b3b72"><ac:plain-text-body><![CDATA[ | [[Bloch 2008 | AA. Bibliography#Bloch 08]] | Item 67: "Avoid excessive synchronization" | ]]></ac:plain-text-body></ac:structured-macro> |
...