...
Sound automated detection of this vulnerability is not feasible in the general case. Heuristic approaches may be useful.
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="28a68e8d-2dbb-4dcc-9ffa-e4996a2266f1"><ac:plain-text-body><![CDATA[ | [ [API 2006AA. References#API 06]] | http://java.sun.com/javase/6/docs/api/java/io/InputStream.html#read()] | ]]></ac:plain-text-body></ac:structured-macro> | <ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="a8f98183-89bf-46e9-9e47-6df0fe6bf9d8"><ac:plain-text-body><![CDATA[ | |
[ [API 2006AA. References#API 06]] | [Class |
...
FIO05-J. Do not expose buffers created using the wrap() or duplicate() methods to untrusted code 12. Input Output (FIO)