There is a potential for SQL injection in the table name parameter.
{ "review_status": "REVIEWED", "url": "https://pkg.go.dev/vuln/GO-2023-1295" }
{ "imports": [ { "path": "github.com/square/squalor", "symbols": [ "AliasedTableExpr.Serialize", "AndExpr.Serialize", "BinaryExpr.Serialize", "ColName.Serialize", "Columns.Serialize", "ComparisonExpr.Serialize", "DB.BindModel", "DB.Delete", "DB.DeleteContext", "DB.Exec", "DB.ExecContext", "DB.Get", "DB.GetContext", "DB.Insert", "DB.InsertContext", "DB.InsertIgnore", "DB.InsertIgnoreContext", "DB.MustBindModel", "DB.Query", "DB.QueryContext", "DB.QueryRow", "DB.QueryRowContext", "DB.Replace", "DB.ReplaceContext", "DB.Select", "DB.SelectContext", "DB.Update", "DB.UpdateContext", "DB.Upsert", "DB.UpsertContext", "Delete.Serialize", "FuncExpr.Serialize", "GroupBy.Serialize", "Insert.Serialize", "JoinTableExpr.Serialize", "Limit.Serialize", "LoadTable", "NonStarExpr.Serialize", "NotExpr.Serialize", "NullCheck.Serialize", "OnDup.Serialize", "OnJoinCond.Serialize", "OrExpr.Serialize", "Order.Serialize", "OrderBy.Serialize", "ParenBoolExpr.Serialize", "RangeCond.Serialize", "Select.Serialize", "SelectExprs.Serialize", "Serialize", "StandardLogger.Log", "StarExpr.Serialize", "Table.loadColumns", "Table.loadKeys", "TableExprs.Serialize", "TableName.Serialize", "TableNames.Serialize", "Tx.Delete", "Tx.DeleteContext", "Tx.Exec", "Tx.ExecContext", "Tx.Get", "Tx.GetContext", "Tx.Insert", "Tx.InsertContext", "Tx.InsertIgnore", "Tx.InsertIgnoreContext", "Tx.Query", "Tx.QueryContext", "Tx.QueryRow", "Tx.QueryRowContext", "Tx.Replace", "Tx.ReplaceContext", "Tx.Select", "Tx.SelectContext", "Tx.Update", "Tx.UpdateContext", "Tx.Upsert", "Tx.UpsertContext", "Update.Serialize", "UpdateExpr.Serialize", "UpdateExprs.Serialize", "UsingJoinCond.Serialize", "ValExprs.Serialize", "ValTuple.Serialize", "Values.Serialize", "Where.Serialize", "quoteName" ] } ] }