...
Even when the logged exception is not accessible to the user, the original exception is still informative and can be used by an attacker to discover sensitive information about the file system layout.
Note that this example also violates rule FIO04-J. Release resources when they are no longer needed, as it fails to close the input stream in a finally
block. Subsequent code examples also omit this finally
block for brevity.
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="bd5e1591a8863020-a459ca54-4ae64aaa-a73f8112-9e021f3ef8c600dbfb518889"><ac:plain-text-body><![CDATA[ | [[Gong 2003 | AA. References#Gong 03]] | 9.1, Security Exceptions | ]]></ac:plain-text-body></ac:structured-macro> |
...