CodeAnt AI home pagelight logodark logo
  • Dashboard
  • Dashboard
  • Documentation
  • Demo Call with CEO
  • Blog
  • Slack
  • Get Started
    • CodeAnt AI
    • Setup
    • Control Center
    • Pull Request Review
    • IDE
    • Compliance
    • Anti-Patterns
    • Code Governance
    • Infrastructure Security Database
    • Application Security Database
      • Apex
      • Bash
      • C
      • Clojure
      • Cpp
      • Csharp
      • Dockerfile
      • Elixir
      • Fingerprints
      • Generic
      • Go
        • Aws-lambda
        • Gin
        • Gorilla
        • Gorm
        • Grpc
        • Jwt-go
        • Lang
        • Net
          • Active-debug-code
          • Command-injection
          • Csrf
          • Dos
          • Nosql
          • Path-traversal
          • Sql
            • Go-vanillasql-format-string-sqli-taint-med-conf
            • Go-vanillasql-format-string-sqli-taint
            • Pg-orm-sqli-taint
              • Pg orm sqli taint
            • Pg-sqli-taint-med-conf
            • Pg-sqli-taint
            • Pgx-sqli-taint-med-conf
            • Pgx-sqli-taint
          • Ssrf
          • Xss
          • Xxe
        • Otto
        • Secrets
        • Template
      • Html
      • Java
      • Javascript
      • Json
      • Kotlin
      • Ocaml
      • Php
      • Problem-based-packs
      • Python
      • Ruby
      • Rust
      • Scala
      • Solidity
      • Swift
      • Terraform
      • Typescript
      • Yaml
    Pg-orm-sqli-taint

    Pg orm sqli taint

    pg-orm-sqli-taint

    This rule has been deprecated. Please remove it from your policies and rulepacks.
    Likelihood: HIGH
    Confidence: MEDIUM
    CWE:
    - CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
    OWASP:
    - A01:2017 - Injection
    - A03:2021 - Injection

    Go vanillasql format string sqli taintPg sqli taint med conf
    twitterlinkedin
    Powered by Mintlify
    Assistant
    Responses are generated using AI and may contain mistakes.