Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: string "FIO04-J" revised to a link markup.

...

Even when the logged exception is not accessible to the user, the original exception is still informative and can be used by an attacker to discover sensitive information about the file system layout.
Note that this example also violates rule FIO04-J. Release resources when they are no longer needed, as it fails to close the input stream in a finally block. Subsequent code examples also omit this finally block for brevity.

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bd5e1591a8863020-a459ca54-4ae64aaa-a73f8112-9e021f3ef8c600dbfb518889"><ac:plain-text-body><![CDATA[

[[Gong 2003

AA. References#Gong 03]]

9.1, Security Exceptions

]]></ac:plain-text-body></ac:structured-macro>

...