This rule was developed in part by <participant names here> at the October 20-22, 2017 OurCS Workshop (http://www.cs.cmu.edu/ourcs/register.html). For more information about this statement, see the About the OurCS Workshop page. |
---|
This guideline is under construction. |
In this space, describe the overall rule. |
|
Risk AssessmentSummary of risk assessment.
|
Automated Detection
|
Related VulnerabilitiesHyperlink black-font text "the CERT website" below, with URL as follows: https://www.kb.cert.org/vulnotes/bymetric?searchview&query=FIELD+KEYWORDS+contains+<RULE_ID> In the URL example above, <RULE_ID> should be substituted by this CERT guideline ID (e.g., INT31-C). Then, remove this purple-font paragraph. Search for vulnerabilities resulting from the violation of this rule on the CERT website. |
Related GuidelinesFill in the table below with at least one entry row, per these instructions, then remove this purple-font section.
|
Bibliography
|