...
Tool | Version | Checker | Description | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Astrée |
| Supported by stubbing/taint analysis | ||||||||||||
CodeSonar |
| IO.INJ.COMMAND | Command injection | |||||||||||
Coverity | 6.5 | TAINTED_STRING | Fully implemented | |||||||||||
Klocwork |
| NNTS.TAINTED | ||||||||||||
LDRA tool suite |
| 108 D, 109 D | Partially implemented | |||||||||||
Parasoft C/C++test |
| BD CERT_C- SECURITY-TDCMD, BD-SECURITY-TDFNAMES, BD-SECURITY-TDSQLSTR02-a | Protect against command injection | |||||||||||
Polyspace Bug Finder |
|
| Checks for: R2016a
Command argument from an unsecure source vulnerable to operating system command injection Path argument from an unsecure source Using a library argument from an externally controlled pathRec. partially covered. |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...