Waterline-Sequel module allows execution of malicious user input SQL statement
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | CVE-2016-10551 | 29 May 201820:29 | – | cve |
![]() | CVE-2016-10551 | 29 May 201820:00 | – | cvelist |
![]() | SQL Injection | 6 May 201616:50 | – | nodejs |
![]() | SQL Injection in waterline-sequel | 18 Feb 201923:54 | – | osv |
![]() | Hardcoded credentials | 29 May 201820:29 | – | prion |
![]() | SQL Injection in waterline-sequel | 18 Feb 201923:54 | – | github |
Source | Link |
---|---|
nodesecurity | www.nodesecurity.io/advisories/115 |
github | www.github.com/balderdashy/waterline/issues/1219 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo