Informējam, ka Sistēma pielāgota darbam ar interneta pārlūkprogrammu Internet Explorer (8. un jaunākām versijām) un Mozilla Firefox (3.6 un jaunākām versijām).
Izmantojot citu interneta pārlūkprogrammu, brīdinām, ka Sistēmas funkcionalitāte var tikt traucēta.
This document itemizes programming language vulnerabilities in Fortran to be avoided in the
development of systems where assured behaviour is required for security, safety, mission-critical and
business-critical software. In general, this need for assured behaviour is applicable to the software
developed, reviewed, or maintained for any application.
This document explains how the vulnerabilities catalogued in ISO/IEC 24772-1:2024 “Programming
languages -- Avoiding vulnerabilities in programming languages -- Part 1: “Language-independent
catalogue of vulnerabilities” manifest in Fortran and documents mechanisms that can be used to
avoid the vulnerabilities.
Reģistrācijas numurs (WIID)
91173
Darbības sfēra
This document itemizes programming language vulnerabilities in Fortran to be avoided in the
development of systems where assured behaviour is required for security, safety, mission-critical and
business-critical software. In general, this need for assured behaviour is applicable to the software
developed, reviewed, or maintained for any application.
This document explains how the vulnerabilities catalogued in ISO/IEC 24772-1:2024 “Programming
languages -- Avoiding vulnerabilities in programming languages -- Part 1: “Language-independent
catalogue of vulnerabilities” manifest in Fortran and documents mechanisms that can be used to
avoid the vulnerabilities.