...
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
ERR05-J | low | unlikely | medium | P2 | L3 |
Related
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
CWE ID 460, "Improper Cleanup on Thrown Exception" | |
| CWE ID 584, "Return Inside Finally Block" |
| CWE ID 248, "Uncaught Exception" |
| CWE ID 705, "Incorrect Control Flow Scoping" |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="92dd4b17d2190dd9-ec5f1e43-4a2e48c1-8dfe823b-a3f58cbbd5520e36f124e10e"><ac:plain-text-body><![CDATA[ | [[Bloch 2005 | AA. Bibliography#Bloch 05]] | Puzzle 41: Field and Stream | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="e4f776a17a1d0844-b9ba5fdd-42524517-8bfa98a6-8cd16f350610c353d60e80fb"><ac:plain-text-body><![CDATA[ | [[Chess 2007 | AA. Bibliography#Chess 07]] | 8.3 Preventing Resource Leaks (Java) | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="21d359cc77e77624-9b57d5a9-40b041df-b05694bb-245a827408d401da1b59373d"><ac:plain-text-body><![CDATA[ | [[Harold 1999 | AA. Bibliography#Harold 99]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="7445a4a706b9c341-263ecdd7-464c414a-b086a774-392538477f447267083e888c"><ac:plain-text-body><![CDATA[ | [[J2SE 2011 | AA. Bibliography#J2SE 11]] | The try-with-resources Statement | ]]></ac:plain-text-body></ac:structured-macro> |
...