Displaying test cases 22101 - 22125 of 113211 in total
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Elastic Search - Source Taint: ENVIRONMENT_VARIABLE - Data Type: simple - Data Flow: java_g...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Lucene - Source Taint: ENVIRONMENT_VARIABLE - Data Type: array - Data Flow: address_...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Lucene - Source Taint: ENVIRONMENT_VARIABLE - Data Type: ARRAY - Data Flow: AD...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Lucene - Source Taint: SOCKET - Data Type: ARRAY - Data Flow: ADDRESS_AS_FUNCT...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Lucene - Source Taint: SOCKET - Data Type: array - Data Flow: java_generics - Contro...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Lenya - Source Taint: ENVIRONMENT_VARIABLE - Data Type: void_pointer - Data Flow: va...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Lucene - Source Taint: FILE_CONTENTS - Data Type: void_pointer - Data Flow: java_gen...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: JTree - Source Taint: ENVIRONMENT_VARIABLE - Data Type: SIMPLE - Data Flow: BASIC - ...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Lenya - Source Taint: FILE_CONTENTS - Data Type: array - Data Flow: var_arg_list - C...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Jena - Source Taint: ENVIRONMENT_VARIABLE - Data Type: simple - Data Flow: var_arg_l...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Jena - Source Taint: SOCKET - Data Type: ARRAY - Data Flow: ADDRESS_AS_FUNCTIO...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Coffee MUD - Source Taint: FILE_CONTENTS - Data Type: simple - Data Flow: var_arg_list - Co...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache POI - Source Taint: FILE_CONTENTS - Data Type: VOID_POINTER - Data Flow: INDEX...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Lucene - Source Taint: ENVIRONMENT_VARIABLE - Data Type: VOID_POINTER - Data F...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache JMeter - Source Taint: FILE_CONTENTS - Data Type: SIMPLE - Data Flow: BASIC -...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Coffee MUD - Source Taint: SOCKET - Data Type: array - Data Flow: var_arg_list - Control Fl...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Elastic Search - Source Taint: FILE_CONTENTS - Data Type: array - Data Flow: basic - Contro...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache POI - Source Taint: FILE_CONTENTS - Data Type: array - Data Flow: var_arg_list - Con...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache POI - Source Taint: ENVIRONMENT_VARIABLE - Data Type: simple - Data Flow: basic - Co...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Lenya - Source Taint: FILE_CONTENTS - Data Type: simple - Data Flow: index_alias_1 -...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Coffee MUD - Source Taint: ENVIRONMENT_VARIABLE - Data Type: SIMPLE - Data Flow: BASI...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Jena - Source Taint: ENVIRONMENT_VARIABLE - Data Type: VOID_POINTER - Data Flo...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata - Base program: Apache Jena - Source Taint: ENVIRONMENT_VARIABLE - Data Type: ARRAY - Data Flow: ADDR...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Jena - Source Taint: FILE_CONTENTS - Data Type: array - Data Flow: address_as_functi...
-
Using Hibernate to execute a dynamic SQL statement with built-in user-controlled input can allow an attacker to modify the statement's meaning or to execute arbitrary SQL commands. Metadata -Base program: Apache Lenya - Source Taint: SOCKET - Data Type: void_pointer - Data Flow: java_generics - ...