The product writes sensitive information to a log file.

Impact: Read Application Data
Logging sensitive user data, full path names, or system information often provides attackers with an additional, less-protected path to acquiring the information.
javajava
...*
java
javaMedium