As an example, if using conditions for menu items and object lists containing the SQL SUBSTRING() method, this will be detected as SQL injection and the session aborted.
The displayed error may be: "Potential SQL injection attack by brute-force".
This is a product defect (31652).
Avoid the SQL substring method.
This will be fixed on a future release of the product. If you require this immediately corrected, please contact Support for a hotfix referencing the defect ID 31652.