...
It is difficult to identify code that can lead to a heap exhaustion since static analysis tools are currently unable to pinpoint violations. The heap size may also differ in different machines.
In the case of the heap size being increased through the command line, the risk assessment would be as follows:
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FIO37-J | low | probable | medium | P4 | L3 |
In the case of the database solution being used, the cost would increase to high due to the usage of a disk-based solution.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FIO37-J | low | probable | high | P2 | L3 |
Related Vulnerabilities
...