CoreStorage in Apple OS X before 10.10 retains a volume's encryption keys upon an eject action in the unlocked state, which makes it easier for physically proximate attackers to obtain cleartext data via a remount.
https://support.apple.com/kb/HT6535
https://exchange.xforce.ibmcloud.com/vulnerabilities/97639
http://www.securitytracker.com/id/1031063
http://www.securityfocus.com/bid/70628
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html