HTTP: MS-SQL Table Name in URL Variable
This signature detects Microsoft SQL table names being sent in HTTP URL variables. Such activity could be an SQL Command Injection attempt. It could also detect non-malicious references to Microsoft SQL table names, such as in a blog posting, or for websites that use SQL commands in their URL's as a part of that website's normal functionality (not recommended).
References
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3