Review

Potential Misuse

Anomaly identified by the detector. Please review whether this anomaly corresponds to a misuse.

Metadata

Hit Rank Confidence Confidence String Pattern Examples Pattern Support Pattern Violation Target Environment Mapping Violation Types
?

4

0.75208336

((pattern support = 10 / 48)(pattern violations = 1 / 1)(violation support = 1 / 1)(overlap = 1 - (2 / 10))) / 4

itext/5091/original-src/com/itextpdf/text/pdf/qrcode/MatrixUtil.java#embedVerticalSeparationPattern(int, int, ByteMatrix);itext/5091/original-src/com/itextpdf/text/pdf/qrcode/MatrixUtil.java#embedPositionAdjustmentPattern(int, int, ByteMatrix);itext/5091/original-src/com/itextpdf/text/pdf/qrcode/MatrixUtil.java#maybeEmbedVersionInfo(int, ByteMatrix);itext/5091/original-src/com/itextpdf/text/pdf/qrcode/MatrixUtil.java#embedPositionDetectionPattern(int, int, ByteMatrix);itext/5091/original-src/com/itextpdf/text/pdf/qrcode/MatrixUtil.java#embedHorizontalSeparationPattern(int, int, ByteMatrix)

10