Last week we got hundreds of emails from three of our websites contact us forms that are all very similar. I presume this is someone trying to do something they shouldn't be doing and break into our site.
Is this something we should be worying about or something we can do anything about?
Here is an example...
Is this something we should be worying about or something we can do anything about?
Here is an example...
Subscribe to Seriously SIlver Newsletter. It was submitted by
1 declare @q varchar(8000) select @q = 0x57414954464F522044454C4159202730303A30303A313527 exec(@q) -- (somebody@mailer.nu) on Monday, May 24, 2010 at 20:40:01
---------------------------------------------------------------------------
pagename: John
anchor: 1
url: http://
description: 1
ourlink: http://
---------------------------------------------------------------------------
1 declare @q varchar(8000) select @q = 0x57414954464F522044454C4159202730303A30303A313527 exec(@q) -- (somebody@mailer.nu) on Monday, May 24, 2010 at 20:40:01
---------------------------------------------------------------------------
pagename: John
anchor: 1
url: http://
description: 1
ourlink: http://
---------------------------------------------------------------------------
Comment