...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
DCL30-C | 3 (high) | 2 (probable) | 1 (high) | P6 | L2 |
Examples of vulnerabilities resulting from the violation of this rule can be found on the CERTwebsite.
References
Wiki Markup |
---|
\[[ISO/IEC 9899-1999|AA. C References#ISO/IEC 9899-1999]\] Section 6.2.4, "Storage durations of objects," and Section 7.20.3, "Memory management functions" |