<?xml version="1.0" encoding="utf-8"?>
<entry xmlns="http://www.w3.org/2005/Atom">
  <author>
    <name>Tony Finch</name>
    <email>dot@dotat.at</email>
    <uri>https://dotat.at/</uri>
  </author>
  <link rel="alternate" href="https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/"/>
  <link rel="self" href="https://dotat.at/:/0TBCU.atom"/>
  <id>https://dotat.at/:/0TBCU.html</id>
  <updated>2025-01-20T18:42:01Z</updated>
  <published>2021-10-22T17:51:01Z</published>
  <title type="html">A floating point parser bug in MySQL left AWS WAF clients vulnerable to SQL injection.</title>
  <content type="html"><![CDATA[
<ul>
  <li>2021‑10‑22 - A floating point parser bug in MySQL left AWS WAF clients vulnerable to SQL injection.</li>
  <li><a href="https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/"><tt>https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/</tt></a></li>
  <li>redirect <a href="https://dotat.at/:/0TBCU"><tt>https://dotat.at/:/0TBCU</tt></a></li>
  <li>blurb <a href="https://dotat.at/:/0TBCU.html"><tt>https://dotat.at/:/0TBCU.html</tt></a></li>
  <li>atom entry <a href="https://dotat.at/:/0TBCU.atom"><tt>https://dotat.at/:/0TBCU.atom</tt></a></li>
  <li><a href="https://web.archive.org/web/*/https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/"><tt>web.archive.org</tt></a> <a href="https://archive.today/https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/"><tt>archive.today</tt></a> </li>
</ul>
]]></content>
</entry>
