<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SQL Injection Lilupophilupop (Part 2) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16248#M11869</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link is only for submitting new application requests. For threat coverage, check out the threat vault or open a case with support for a new threat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Sep 2012 21:41:40 GMT</pubDate>
    <dc:creator>SRA</dc:creator>
    <dc:date>2012-09-05T21:41:40Z</dc:date>
    <item>
      <title>SQL Injection Lilupophilupop (Part 2)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16246#M11867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, recently a famous SQL Injection has started up once more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will there be a vulnerability signature update which includes this new version of the Lilupophilupop SQL Injection code?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More information can be found at &lt;A href="http://isc.sans.edu/diary/SQL+Injection+Lilupophilupop+style+Part+2/13864" title="http://isc.sans.edu/diary/SQL+Injection+Lilupophilupop+style+Part+2/13864"&gt;ISC Diary | SQL Injection Lilupophilupop style, Part 2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Aug 2012 13:42:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16246#M11867</guid>
      <dc:creator>dciccone</dc:creator>
      <dc:date>2012-08-09T13:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: SQL Injection Lilupophilupop (Part 2)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16247#M11868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can request app enhancement from the Apps and Threats Research Center.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.paloaltonetworks.com/researchcenter/tools/"&gt;http://www.paloaltonetworks.com/researchcenter/tools/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there you can click on Submit an app and provide details there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the above can also be used to suggest new/updated threatid's (in case the threat team somehow missed it).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 22:23:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16247#M11868</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-08-20T22:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: SQL Injection Lilupophilupop (Part 2)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16248#M11869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link is only for submitting new application requests. For threat coverage, check out the threat vault or open a case with support for a new threat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 21:41:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16248#M11869</guid>
      <dc:creator>SRA</dc:creator>
      <dc:date>2012-09-05T21:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: SQL Injection Lilupophilupop (Part 2)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16249#M11870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="p1"&gt;We normally don't write signatures for specific URLs that end up getting inserted via SQL injection attacks, unless they are exceptionally pervasive.&amp;nbsp; These are everywhere and it is impossible to cover them all. Instead we have generic SQL injection signatures that can detect many common SQL injection attempts, and customers can also write custom vulnerability signatures for specific SQL injection attacks that you may be concerned about. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2012 21:58:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sql-injection-lilupophilupop-part-2/m-p/16249#M11870</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2012-09-05T21:58:33Z</dc:date>
    </item>
  </channel>
</rss>

