This rule is a stub. It was generated by a tool that warned about using a resource after a method is invoked on the resource which invalidates it.
This noncompliant code example shows an example where ...
In this compliant solution, ...
Leaking sensitive information outside a trust boundary is not a good idea.
Rule | Severity | Likelihood | Detectable | Repairable | Priority | Level |
|---|---|---|---|---|---|---|
OBJ14-J | Medium | Likely | No | No | P6 | L2 |
| CERT C Secure Coding Standard | MEM30-C. Do not access freed memory |
| SEI CERT C++ Coding Standard | MEM50-CPP. Do not access freed memory |
| MITRE CWE | CWE-416, Use After Free |
TODO