Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

It is difficult to identify code that can lead to a heap exhaustion since static analysis tools are currently unable to pinpoint violations. The heap size may also differ in different machines.

In the case of the heap size being increased through the command line, the risk assessment would be as follows:

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

FIO37-J

low

probable

medium

P4

L3

In the case of the database solution being used, the cost would increase to high due to the usage of a disk-based solution.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

FIO37-J

low

probable

high

P2

L3

Related Vulnerabilities

...