...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
\[[API 2006|AA. References#API 06] \] Class {{ Wiki Markup java.nio.ByteBuffer
}}
\
[[MITRE 2009|AA. References#MITRE 09]\] [CWE ID 524|http://cwe.mitre.org/data/definitions/ 524.html] "Information Exposure through Caching," [CWE ID 528|http://cwe.mitre.org/data/definitions/ 528.html] "Exposure of Core Dump File to an Unauthorized Control Sphere," [CWE ID 215|http://cwe.mitre.org/data/definitions/ 215.html] "Information Exposure through Debug Information," [CWE ID 534|http://cwe.mitre.org/data/definitions/534.html] "Information Exposure through Debug Log Files," [CWE ID 526|http://cwe.mitre.org/data/definitions/ 526.html] "Information Exposure through Environmental Variables," and [CWE ID 226|http://cwe.mitre.org/data/definitions/ 226.html] "Sensitive Information Uncleared before Release"
\
[[Sun 2006|AA. References#Sun 06] \] [Reading ASCII Passwords From an InputStream Example|http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#ReadPassword] (JCA Reference Guide)
\
[[Tutorials 2008|AA. References#Tutorials 08]\] [I/O from the Command Line|http://java.sun.com/docs/books/tutorial/essential/io/cl.html]
...
MSC54-J. Carefully design interfaces before releasing them 49. Miscellaneous (MSC)