...
Automated detection is infeasible in the general case.
Related
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
CWE ID 198, "Use of Incorrect Byte Ordering" |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="ebd80834efd390c0-fa6a126e-41dd43d7-a52b9780-e72d740bf7d80acab2ac2799"><ac:plain-text-body><![CDATA[ | [[API 2006 | AA. Bibliography#API 06]] | Class [ByteBuffer | http://download.oracle.com/javase/6/docs/api/java/nio/ByteBuffer.html]: Methods | http://download.oracle.com/javase/6/docs/api/java/lang/Integer.html]: method | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="08654fc8724dcc98-3d085d34-46b64845-91788614-ac094049b0eac4ace52e5b01"><ac:plain-text-body><![CDATA[ | [[Cohen 1981 | AA. Bibliography#Cohen 81]] | "On Holy Wars and a Plea for Peace" | ]]></ac:plain-text-body></ac:structured-macro> | ||
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="8dff3cc2909f3aec-fc58a90c-4e6f4052-898db391-ff7098f5e5f474f3ef713ad8"><ac:plain-text-body><![CDATA[ | [[Harold 1997 | AA. Bibliography#Harold 97]] | Chapter 2: "Primitive Data Types, Cross Platform issues" | ]]></ac:plain-text-body></ac:structured-macro> |
...