Public exploits available
This signature detects commonly used exploitation techniques for SQL injection vulnerabilities
By exploiting the SQL injection vulnerability an attacker could modify the query that is submitted to the database. This would give the attacker the ability to insert malicious SQL commands embedded in a URL that would be passed to the database.
The easiest way to explain SQL Injection is via a scenario. Suppose a web site hosted an application that allowed visitors to the site to search an online database for particular words. If that application operated by simply taking whatever input a user provided, inserting it into a database query, and running the query, it could be possible for an attacker to provide SQL statements instead of text. The result would be that when the web application ran its query, the attacker's commands would be executed as part of this query. This type of vulnerability is known as a SQL Injection.
No known false positives at this time.