...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
The Checker Framework |
| Tainting Checker | Trust and security errors (see Chapter 8) | ||||||
CodeSonar |
| FB.SECURITY.SQL_PREPARED_STATEMENT_GENERATED_FROM_NONCONSTANT_STRING FB.SECURITY.SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE | A prepared statement is generated from a nonconstant String Nonconstant string passed to execute method on an SQL statement | ||||||
Coverity | 7.5 | SQLI | Implemented | ||||||
Findbugs | 1.0 | SQL_NONCONSTANT_STRING_PASSED_TO_EXECUTE | Implemented | ||||||
Fortify | 1.0 | HTTP_Response_Splitting | Implemented | ||||||
Klocwork | SV.DATA.BOUND | Implemented | |||||||
Parasoft Jtest |
| BD-SECURITY-TDSQL | Implemented | ||||||
SonarQube Java Plugin |
| - Executing SQL queries is security-sensitive S3649 - SQL queries should not be vulnerable to injection attacks Implemented |
Related Vulnerabilities
CVE-2008-2370 describes a vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16. When a RequestDispatcher
is used, Tomcat performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ..
(dot dot) in a request parameter.
...