HTTP: MS-SQL Function in URL Variable
This signature detects Microsoft SQL functions being sent in HTTP URL variables. Such activity could be an SQL Command Injection attempt. It could also detect non-malicious references to Microsoft SQL functions, such as in a blog posting, or for websites that use SQL commands in their URL's as a part of that website's normal functionality (not recommended).
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3