...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BADFUNC.PATH.SYSTEM IO.INJ.COMMAND | Use of system Command Injection | ||||||
Compass/ROSE | |||||||||
| SV.CODE_INJECTION.SHELL_EXEC | ||||||||
| 588 S | Fully implemented | |||||||
PRQA QA-C |
| Warncall -wc system | Partially implemented |
...
CERT C Secure Coding Standard | ENV03-C. Sanitize the environment when invoking external programs. |
CERT C++ Secure Coding Standard | ENV04ENV02-CPP. Do not call system() if you do not need a command processor |
CERT Oracle Secure Coding Standard for Java | IDS07-J. Do not pass Sanitize untrusted , unsanitized data passed to the Runtime.exec() method |
ISO/IEC TR 24772:2013 | Unquoted Search Path or Element [XZQ] |
ISO/IEC TS 17961:2013 | Calling system [syscall] |
MITRE CWE | CWE-78, Improper Neutralization of Special Elements Used in an OS Command (aka "OS Command Injection") CWE-88, Argument Injection or Modification |
...