Skip to main content
CUI

Vulnerability V-206576

Back

V-206576

CAT II

The DBMS and associated applications must reserve the use of dynamic code execution for situations that require it.

Ships Affected
1
Total Findings
1
Open
0
Closed
1

Check Text

Review DBMS source code (stored procedures, functions, triggers) and application source code, to identify cases of dynamic code execution. If dynamic code execution is employed in circumstances where the objective could practically be satisfied by static execution with strongly typed parameters, this is a finding.

Fix Text

Where dynamic code execution is employed in circumstances where the objective could practically be satisfied by static execution with strongly typed parameters, modify the code to do so.

STIG Reference

STIG
Database Security Requirements Guide
Version
4
Release
5
Rule ID
SV-206576r961158_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 Montford Point ShipCLIP DB V4R4.ckl
Unassigned 2026-03-06T12:50:21.809591 View in Context
CUI