...
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
MET00-J | high | likely | high | P9 | L2 |
Related
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6bf0da0f1ae347e8-7a60aede-480641e9-86438286-f520df860f2cd68f459cb7f4"><ac:plain-text-body><![CDATA[ | [ISO/IEC TR 24772:2010 | http://www.aitcnet.org/isai/] | "Argument Passing to Library Functions [TRJ]" | ]]></ac:plain-text-body></ac:structured-macro> |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="9a20d3e606f57bca-610f3cb8-44234f82-9a1a9eee-5aa6fb214d6c7268516ab3ef"><ac:plain-text-body><![CDATA[ | [[Bloch 2008 | AA. Bibliography#Bloch 08]] | Item 38: Check parameters for validity | ]]></ac:plain-text-body></ac:structured-macro> |
...