...
Failure to limit the lifetime of sensitive data can lead to information leaks.
Guideline Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MSC10-J | medium | likely | medium | P12 | L1 |
...
Bibliography
Wiki Markup |
---|
\[java:[API 2006|AA. Bibliography#API 06]\] Class {{java.nio.ByteBuffer}} \[java:[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 524|http://cwe.mitre.org/data/definitions/524.html] "Information Exposure Through Caching", [CWE ID 528|http://cwe.mitre.org/data/definitions/528.html] "Exposure of Core Dump File to an Unauthorized Control Sphere", [CWE ID 215|http://cwe.mitre.org/data/definitions/215.html] "Information Exposure Through Debug Information", [CWE ID 534|http://cwe.mitre.org/data/definitions/534.html] "Information Exposure Through Debug Log Files", [CWE ID 526|http://cwe.mitre.org/data/definitions/526.html] "Information Exposure Through Environmental Variables" and [CWE ID 226|http://cwe.mitre.org/data/definitions/226.html] "Sensitive Information Uncleared Before Release" \[java:[Sun 2006|AA. Bibliography#Sun 06]\] [Reading ASCII Passwords From an InputStream Example|http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#ReadPassword] (JCA Reference Guide) \[java:[Tutorials 2008|AA. Bibliography#Tutorials 08]\] [I/O from the Command Line|http://java.sun.com/docs/books/tutorial/essential/io/cl.html] |
...