
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2833fa23-1d96-49ca-898c-49dda6f5593b"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-460 | http://cwe.mitre.org/data/definitions/460.html] "Improper Cleanup on Thrown Exception" | ]]></ac:plain-text-body></ac:structured-macro> | ||
| CWE -ID 584, "Return Inside Finally Block" | ||||||
| CWE -ID 248, "Uncaught Exception" | ||||||
| CWE -ID 705, "Incorrect Control Flow Scoping" |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="25c8bd4111c43011-9a8794ab-41b34da7-87e7bfb7-319a18fb14dab9471b205775"><ac:plain-text-body><![CDATA[ | [[Bloch 2005 | AA. Bibliography#Bloch 05]] | Puzzle 41: Field and Stream | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="17b280d102dc8d8b-2fbf11cf-44e24bba-8a149c0e-190db0e73f8bf7374e21eb53"><ac:plain-text-body><![CDATA[ | [[Chess 2007 | AA. Bibliography#Chess 07]] | 8.3 Preventing Resource Leaks (Java) | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="0496ff16250bcb0f-55bbc9e4-4c3648ab-95b0a7b6-b35e0302689d150301e3f5bd"><ac:plain-text-body><![CDATA[ | [[Harold 1999 | AA. Bibliography#Harold 99]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="654f606d92fd0842-cacb1a1b-42be4b83-ac709f92-60d90aa8e6797cd08e130931"><ac:plain-text-body><![CDATA[ | [[J2SE 2011 | AA. Bibliography#J2SE 11]] | The try-with-resources Statement | ]]></ac:plain-text-body></ac:structured-macro> |
...