This rule is a stub. It was generated by a tool that warned about using a resource after a method is invoked on the resource which invalidates it.
Noncompliant Code Example
This noncompliant code example shows an example where ...
Compliant Solution
In this compliant solution, ...
Risk Assessment
Leaking sensitive information outside a trust boundary is not a good idea.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
OBJ14-J | Medium | Likely | High | P6 | L2 |
Related Guidelines
CERT C Secure Coding Standard | MEM30-C. Do not access freed memory |
SEI CERT C++ Coding Standard | MEM50-CPP. Do not access freed memory |
MITRE CWE | CWE-416, Use After Free |
Bibliography
TODO