| Título | ESAPI esapi-java-legacy 2.6.2.0 SQL injection filtering bypass2 |
|---|
| Descripción | When using MySQL codec's ANSI mode and ESAPI library for encoding in ESAPI2.6.2.0 components, SQL injection defense can be bypassed. Attackers can exploit this vulnerability to bypass SQL injection defense and launch SQL injection attacks |
|---|
| Fuente | ⚠️ https://github.com/uglory-gll/javasec/blob/main/ESAPI.md |
|---|
| Usuario | uglory (UID 82151) |
|---|
| Sumisión | 2025-06-04 15:23 (hace 10 meses) |
|---|
| Moderación | 2025-06-28 09:15 (24 days later) |
|---|
| Estado | Duplicado |
|---|
| Entrada de VulDB | 314321 [ESAPI esapi-java-legacy hasta 2.6.2.0 SQL Injection Defense Encoder.encodeForSQL Ejecución remota de código] |
|---|
| Puntos | 0 |
|---|