...
Memory leaks in Java applications may be exploited in a DoS attack.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
MSC04-J | Low | Unlikely | No | NoHigh | P1 | L3 |
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Parasoft Jtest |
| CERT.MSC04.LEAKS | Ensure resources are deallocated |
...