...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
FIO10-J | low | unlikely | medium | P2 | L3 |
Automated Detection
TODO
Related
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
CWE ID 135, "Incorrect Calculation of Multi-Byte String Length" |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="ec31a07dd75cf89b-333110b8-451245bd-b39f9a1d-0b4e1c43ad84975bc84cef5b"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] | Class | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="7d7673b2057ed1d7-658fcbb0-424e4373-94589896-ce17dfd0433b29a14e874fc3"><ac:plain-text-body><![CDATA[ | [[Chess 2007 | AA. Bibliography#Chess 07]] | 8.1 Handling Errors with Return Codes | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="67320ed826fdeed1-729ac98f-433043c8-82d2b61d-904c309ad9b628fce64fc12a"><ac:plain-text-body><![CDATA[ | [[Harold 1999 | AA. Bibliography#Harold 99]] | Chapter 7: Data Streams, Reading Byte Arrays | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="3774390caa86968d-27626558-4dc74658-8b12a802-b5ecd1c3c09d636ff656c5f0"><ac:plain-text-body><![CDATA[ | [[Phillips 2005 | AA. Bibliography#Phillips 05]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
...