Forum Discussion
boneyard
Sep 05, 2013MVP
200002149; SQL-INJ expressions like "and 1=1" (5). so it somewhere finds a string that looks like and 1=1 which is a common trick in SQL injection attacks.
the ASM is in front of your webserver, so it gets the data send to the webserver. so that is before PHP does something with it, but php probably did create the page where you entered the data.
as this signature is parameter based you could also just exclude it for the content parameter and have it active on all other parameters.