| Titre | ESAPI esapi-java-legacy 2.6.2.0 SQL injection filtering bypass1 |
|---|
| Description | When using Oracle's codec OracleCodex and ESAPI library for encoding in ESAPI2.6.2.0 components, SQL injection can be bypassed. Attackers can exploit this vulnerability to bypass SQL injection and launch SQL injection attacks |
|---|
| La source | ⚠️ https://github.com/uglory-gll/javasec/blob/main/ESAPI.md |
|---|
| Utilisateur | uglory (UID 82151) |
|---|
| Soumission | 04/06/2025 15:22 (il y a 10 mois) |
|---|
| Modérer | 28/06/2025 09:15 (24 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 314321 [ESAPI esapi-java-legacy jusqu’à 2.6.2.0 SQL Injection Defense Encoder.encodeForSQL Exécution de code à distance] |
|---|
| Points | 16 |
|---|