searchgfx.com

  forum.lddb.com

  trac.ffmpeg.org

  codeby.net

thank ,but it happend again, and i found search 'UNION ALL SELECT CONCAT(0x716b756a71,0x4b5163596666574b5461,0x7170656b71) ' found so many web have it . so what it means in mysql. Other. Additional subscriptions. Selected 3rd party promotions.

  forum.opencart.com

  satsis.info

  www.experts-exchange.com

  github.com

  search.prikaz.kz

SELECT 1 from (SELECT COUNT(*), CONCAT(0x3a, 0x3a, (SELECT database()), 0x3a, 0x3a, floor( rand() * 2 ) )a FROM information_schema.columns GROUP BY a ) b The malicious code is ‘SELECT database()’, which displays the current database name but in the SQL error.

  hackr.io

Page generated - 0.4115171432 (1b535a7e21fe3ef02fd9196e17c6ea52)