Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

Wiki Markup\[[API 2006|AA. References#API 06] \] Class {{java.nio.ByteBuffer}} \
[[MITRE 2009|AA. References#MITRE 09]\] [CWE ID 524|http://cwe.mitre.org/data/definitions/ 524.html] "Information Exposure through Caching," [CWE ID 528|http://cwe.mitre.org/data/definitions/ 528.html] "Exposure of Core Dump File to an Unauthorized Control Sphere," [CWE ID 215|http://cwe.mitre.org/data/definitions/ 215.html] "Information Exposure through Debug Information," [CWE ID 534|http://cwe.mitre.org/data/definitions/534.html] "Information Exposure through Debug Log Files," [CWE ID 526|http://cwe.mitre.org/data/definitions/ 526.html] "Information Exposure through Environmental Variables," and [CWE ID 226|http://cwe.mitre.org/data/definitions/ 226.html] "Sensitive Information Uncleared before Release" \
[[Sun 2006|AA. References#Sun 06] \] [Reading ASCII Passwords From an InputStream Example|http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#ReadPassword] (JCA Reference Guide) \
[[Tutorials 2008|AA. References#Tutorials 08]\] [I/O from the Command Line|http://java.sun.com/docs/books/tutorial/essential/io/cl.html]

...

MSC54-J. Carefully design interfaces before releasing them 49. Miscellaneous (MSC)