保護DataHogo
LearnFree ToolsBlogPricingWhy I Built ThisSign inGet Started
Back to all vulnerabilities

Database Security

Connection strings exposed, database backups in repos, raw ORM queries, unsafe deserialization, and N+1 query exploitation.

5 vulnerabilities

Connection String Exposed

critical

Database connection URLs containing usernames and passwords are hardcoded in source code, making credentials accessible to anyone with repo access.

CWE-798A07:2021

Database Backup Exposed

high

Database dump files (.sql, .dump, .bak) committed to the repository expose the entire database schema and data, including user credentials and sensitive records.

CWE-538A05:2021

Raw Queries in ORMs

high

Using raw SQL methods like Prisma's $queryRaw or Sequelize's query() with string interpolation bypasses the ORM's built-in SQL injection protection.

CWE-89A03:2021

Unsafe Deserialization

high

Deserializing untrusted data with libraries like node-serialize or Python's yaml.load allows attackers to execute arbitrary code on the server.

CWE-502A08:2021

Exploitable N+1 Queries

low

Unbounded relation expansion in ORM queries allows attackers to trigger thousands of database queries with a single API request, causing denial of service.

CWE-400API4:2023
保護DataHogo

Product

  • Security Scanner
  • Security for Vibecoders
  • Snyk Alternative
  • Pricing

Resources

  • Learn
  • Free Tools
  • Blog

Company

  • Why I Built This
  • Terms
  • Privacy

© 2026 Data Hogo. All rights reserved.