{keyword}') And 7365=convert(int,(select Char(113) Char(98) Char(113) Char(118) Char(113) (select (case When (7365=7365) Then Char(49) Else Char(48) End)) Char(113) Char(113) Char(98) Char(113) Char(113))) And ('armv'='armv May 2026
The CHAR functions are used to bypass simple text filters. They translate to specific letters (like q , b , v ) to create a "fingerprint" or marker in the database response.
Are you currently on a application, or did you find this string in your website's server logs ? The CHAR functions are used to bypass simple text filters
It asks the database to check if the number 7365 is equal to a value it generates. It asks the database to check if the
The CASE WHEN (7365=7365) is a "True/False" test. Since it’s true, it returns CHAR(49) (the number 1). If the database processes this and returns a "1" or a success message, the person running the code knows the site is vulnerable. If the database processes this and returns a
It looks like you’ve shared a snippet of , likely used in security testing or by automated vulnerability scanners.
The AND ('aRMv'='aRMv at the end is used to balance out the remaining syntax of the original query so the site doesn't crash or show a standard error.
It uses ') to try and close an existing data field so it can start running its own commands.