 
                            This rule is a stub. It was generated by a tool that warned about using a resource after a method is invoked on the resource which invalidates it.
Noncompliant Code Example
This noncompliant code example shows an example where ...
| Code Block | ||||
|---|---|---|---|---|
| 
 | 
Compliant Solution
In this compliant solution, ...
| Code Block | ||
|---|---|---|
| 
 | ||
|   | ||
Risk Assessment
Leaking sensitive information outside a trust boundary is not a good idea.
| Rule | Severity | Likelihood | 
|---|
| Detectable | Repairable | Priority | Level | 
|---|---|---|---|
| OBJ14-J | Medium | Likely | 
| No | No | P6 | L2 | 
Related Guidelines
| CERT C Secure Coding Standard | MEM30-C. Do not access freed memory | 
| SEI CERT C++ Coding Standard | MEM50-CPP. Do not access freed memory | 
| MITRE CWE | CWE-416, Use After Free | 
Bibliography
TODO