Newly Added (33)
- A signature to prevent attackers from adding a account for a new user in the current database.
- A signature to prevent attackers from changing a password for a MSSQL database login.
- A signature to prevent attackers from deleting database information using "drop".
- A signature to prevent attackers from executing arbitrary commands in Invision Power Board (CVE-2012-5692).
- A signature to prevent attackers from executing arbitrary commands in op5 Monitor and op5 Appliance (CVE-2012-0261).
- A signature to prevent attackers from executing arbitrary commands in op5 Monitor and op5 Appliance (CVE-2012-0262).
- A signature to prevent attackers from executing arbitrary commands in openSIS 4.5 through 5.2(CVE-2013-1349).
- A signature to prevent attackers from executing arbitrary commands in TinyWebGallery 1.8.3 (CVE-2012-5347).
- A signature to prevent attackers from executing arbitrary commands in ZoneMinder Video Server(CVE-2013-0232).
- A signature to prevent attackers from executing arbitrary SQL commands in the procedure in Oracle Database Server 10g.
- A signature to prevent attackers from executing arbitrary SQL commands through the functions in IBM DB2 database.
- A signature to prevent attackers from executing arbitrary SQL commands through the stored procedures in Oracle database.
- A signature to prevent attackers from executing arbitrary SQL commands through the stored procedures in SAP Sybase database.
- A signature to prevent attackers from executing arbitrary SQL commands through the stored procedures of MSSQL Server database.
- A signature to prevent attackers from instucting MSSQL Server Agent to executing a job.
- A signature to prevent attackers from probing sensitive information from MySQL database using "concat()", "concat_ws()" and "group_concat()" function.
- A signature to prevent attackers from probing sensitive information from the target host database through the function DBMS_ADVISOR.GEN_SHRINK_DDL of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the function DBMS_METADATA.OKTOEXP_2NDARY_TABLE of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the function wwv_flow_security.check_db_password of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package DBMS_CDC_IMPDP of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package DBMS_CDC_ISUBSCRIBE of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package DBMS_EXPDP of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package DBMS_SQLTUNE of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package DBMS_STAT_FUNCS of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package DBMS_UPGRADE of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package DBMS_XDBZ of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package DBMS_XDBZ0 of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package SDO_3GL of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package SDO_CS of Oracle database.
- A signature to prevent attackers from probing sensitive information from the target host database through the package SDO_TUNE of Oracle database.
- A signature to prevent attackers from removing an alert in MSSQL database.
- A signature to prevent attackers from using "convert" to retrieve database information with explicit conversion errors.
- List of Yandex Bot IP addresses.