Intrusion Prevention



This indicates an attempt to exploit a SQL-injection vulnerability through HTTP requests.
The vulnerability is a result of the application's failure to check user supplied input before using it in an SQL query. As a result, a remote attacker can send a crafted query to execute SQL commands on a vulnerable server.

Affected Products

This is a generic signature against web-based SQL injections.


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the latest patch to the vulnerable software.