Soumettre #590149: ESAPI esapi-java-legacy 2.6.2.0 SQL injection filtering bypass1information

TitreESAPI esapi-java-legacy 2.6.2.0 SQL injection filtering bypass1
DescriptionWhen using Oracle's codec OracleCodex and ESAPI library for encoding in ESAPI2.6.2.0 components, SQL injection can be bypassed. Attackers can exploit this vulnerability to bypass SQL injection and launch SQL injection attacks
La source⚠️ https://github.com/uglory-gll/javasec/blob/main/ESAPI.md
Utilisateur
 uglory (UID 82151)
Soumission04/06/2025 15:22 (il y a 10 mois)
Modérer28/06/2025 09:15 (24 days later)
StatutAccepté
Entrée VulDB314321 [ESAPI esapi-java-legacy jusqu’à 2.6.2.0 SQL Injection Defense Encoder.encodeForSQL Exécution de code à distance]
Points16

Do you know our Splunk app?

Download it now for free!