Get Started
- CodeAnt AI
- Control Center
- Pull Request Review
- IDE
- Compliance
- Anti-Patterns
- Code Governance
- Infrastructure Security Database
- Application Security Database
- Apex
- Bash
- C
- Clojure
- Cpp
- Csharp
- Dockerfile
- Elixir
- Fingerprints
- Generic
- Go
- Aws-lambda
- Gin
- Gorilla
- Gorm
- Grpc
- Jwt-go
- Lang
- Net
- Active-debug-code
- Command-injection
- Csrf
- Dos
- Nosql
- Path-traversal
- Sql
- Go-vanillasql-format-string-sqli-taint-med-conf
- Go-vanillasql-format-string-sqli-taint
- Pg-orm-sqli-taint
- Pg-sqli-taint-med-conf
- Pg-sqli-taint
- Pgx-sqli-taint-med-conf
- Pgx-sqli-taint
- Ssrf
- Xss
- Xxe
- Otto
- Secrets
- Template
- Html
- Java
- Javascript
- Json
- Kotlin
- Ocaml
- Php
- Problem-based-packs
- Python
- Ruby
- Rust
- Scala
- Solidity
- Swift
- Terraform
- Typescript
- Yaml
Pg-orm-sqli-taint
Pg orm sqli taint
This rule has been deprecated. Please remove it from your policies and rulepacks.
Likelihood: HIGH
Confidence: MEDIUM
CWE:
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
OWASP:
- A01:2017 - Injection
- A03:2021 - Injection