This rule is a stub.
Noncompliant Code Example
This noncompliant code example shows an example where ...
Compliant Solution
In this compliant solution, ...
Risk Assessment
Leaking sensitive information outside a trust boundary is not a good idea.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
OBJ14-J | Medium | Likely | High | P6 | L2 |
Related Guidelines
CERT C Secure Coding Standard | MEM30-C. Do not access freed memory |
SEI CERT C++ Coding Standard | MEM50-CPP. Do not access freed memory |
MITRE CWE | CWE-416, Use After Free |