Threat Encyclopedia



This indicates an attempt to exploit a SQL-injection vulnerability through HTTP requests.
The vulnerability is a result of the application's failure to check user supplied input before using it in an SQL query. As a result, a remote attacker can send a crafted query to execute SQL commands on a vulnerable server.

affected-products-logoAffected Products

This is a generic signature against web-based SQL injections.

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the latest patch to the vulnerable software.

Telemetry logoTelemetry