Review

Potential Misuse

Anomaly identified by the detector. Please review whether this anomaly corresponds to a misuse.

Metadata

Hit Rank Confidence Confidence String Pattern Examples Pattern Support Pattern Violation Target Environment Mapping Violation Types
?

3

0.7604166

((pattern support = 18 / 48)(pattern violations = 1 / 1)(violation support = 1 / 1)(overlap = 1 - (1 / 3))) / 4

itext/5091/original-src/com/itextpdf/text/pdf/codec/TIFFDirectory.java#TIFFDirectory(RandomAccessFileOrArray, long, int);itext/5091/original-src/com/itextpdf/text/pdf/codec/TIFFDirectory.java#initialize(RandomAccessFileOrArray);itext/5091/original-src/com/itextpdf/text/pdf/PdfReader.java#getStreamBytesRaw(PRStream, RandomAccessFileOrArray);itext/5091/original-src/com/itextpdf/text/pdf/codec/TiffImage.java#getTiffImage(RandomAccessFileOrArray, int, boolean);itext/5091/original-src/com/itextpdf/text/pdf/codec/TIFFDirectory.java#getNumDirectories(RandomAccessFileOrArray)

18