...
Creating multiple buffered wrappers around an InputStream can cause unexpected program behavior when the InputStream is redirected.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
FIO06-J | Low | Unlikely | No | NoMedium | P2P1 | L3 |
Automated Detection
Sound automated detection of this vulnerability is not feasible in the general case. Heuristic approaches may be useful.
...