This rule is a stub. It was generated by a tool that warned about using a resource after a method is invoked on the resource which invalidates it.

Noncompliant Code Example

This noncompliant code example shows an example where ...

 


Compliant Solution

In this compliant solution, ...

 

Risk Assessment

Leaking sensitive information outside a trust boundary is not a good idea.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

OBJ14-J

Medium

Likely

High

P6

L2

Related Guidelines

CERT C Secure Coding StandardMEM30-C. Do not access freed memory
SEI CERT C++ Coding StandardMEM50-CPP. Do not access freed memory
MITRE CWE

CWE-416, Use After Free

Bibliography

TODO