...
Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
ERR05-J | low | unlikely | medium | P2 | L3 |
Related Vulnerabilities
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="66ef85bd-35be-47d0-b78a-58f869a3e305"><ac:plain-text-body><![CDATA[ | [[MITRE 2009 | AA. Bibliography#MITRE 09]] | [CWE-460 | http://cwe.mitre.org/data/definitions/460.html] "Improper Cleanup on Thrown Exception" | ]]></ac:plain-text-body></ac:structured-macro> |
| CWE-584 "Return Inside Finally Block" | ||||
| CWE-248 "Uncaught Exception" | ||||
| CWE-705 "Incorrect Control Flow Scoping" |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="1d16c885bb44027e-09e4837f-419c4e98-a9ceb4e8-bd4534f020edb0e7cf893815"><ac:plain-text-body><![CDATA[ | [[Bloch 2005 | AA. Bibliography#Bloch 05]] | Puzzle 41: Field and Stream | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="ef7733554a2405ef-caa1bc4f-4b95476c-aacc96d9-24f7a9ccd8e055c527bf6cf8"><ac:plain-text-body><![CDATA[ | [[Chess 2007 | AA. Bibliography#Chess 07]] | 8.3 Preventing Resource Leaks (Java) | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2dcbfe336b646131-f0fca0d5-44c04e01-b3188d3e-946b1dd25f21a690ad12c550"><ac:plain-text-body><![CDATA[ | [[Harold 1999 | AA. Bibliography#Harold 99]] |
| ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="698ad2728f6eac62-9b1f55c7-45084682-ad6f8141-7b14f0f2434d489e1566d6d8"><ac:plain-text-body><![CDATA[ | [[J2SE 2011 | AA. Bibliography#J2SE 11]] | The try-with-resources Statement | ]]></ac:plain-text-body></ac:structured-macro> |
...