...
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ERR05-J | low | unlikely | medium | P2 | L3 |
Related Vulnerabilities
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0d0c6efa-6352-45ab-b05c-5e976447c21a"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-460 | http://cwe.mitre.org/data/definitions/460.html] "Improper Cleanup on Thrown Exception" | ]]></ac:plain-text-body></ac:structured-macro> |
| CWE-584 "Return Inside Finally Block" | ||||
| CWE-248 "Uncaught Exception" | ||||
| CWE-705 "Incorrect Control Flow Scoping" |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="b69674cf88ae6325-f2126b8b-42784a5d-b65b898b-0374e318c8da64159df7013e"><ac:plain-text-body><![CDATA[ | [[Bloch 2005 | AA. Bibliography#Bloch 05]] | Puzzle 41: Field and Stream | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6129a32aa2ddcf65-95523d84-4e054a0b-9b689c28-f313d90c6b59306e07774851"><ac:plain-text-body><![CDATA[ | [[Chess 2007 | AA. Bibliography#Chess 07]] | 8.3 Preventing Resource Leaks (Java) | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="344f78353fba44dd-b78b2b8b-4c174800-809d9b90-3e34afa762a38094e20d97f8"><ac:plain-text-body><![CDATA[ | [[Harold 1999 | AA. Bibliography#Harold 99]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d7c82b50ce92b2b5-367debdc-4c71480b-91a2969a-602e9fec020c93ca2c1dc48e"><ac:plain-text-body><![CDATA[ | [[J2SE 2011 | AA. Bibliography#J2SE 11]] | The try-with-resources Statement | ]]></ac:plain-text-body></ac:structured-macro> |
...