{keyword};select Dbms_pipe.receive_message(chr(108)||chr(98)||chr(116)||chr(86),5) From Dual-- May 2026

Ensure your database user account does not have permission to execute sensitive packages like DBMS_PIPE unless absolutely necessary [8].

It looks like you've shared a snippet of code designed for an attack, specifically a time-based blind injection [1, 2]. Technical Breakdown

If you are seeing this in your logs, your system is being scanned for vulnerabilities. You should take the following steps immediately: Ensure your database user account does not have

: This comments out the rest of the original query so the database doesn't throw a syntax error when it tries to run the attacker's injected code [3]. The Goal of the Attack

: This is a built-in Oracle function. In this context, it is being used to force the database to pause or "sleep" for a specific amount of time [2, 4]. You should take the following steps immediately: :

: This is an obfuscated way of writing the string "lbtV." Attackers use CHR() codes to bypass simple security filters that look for specific words [5]. ,5 : This tells the database to wait for 5 seconds [2].

Use "Prepared Statements" so the database treats the input as literal text, not executable code [7]. : This is an obfuscated way of writing the string "lbtV

The goal of this specific "Sleep" command isn't to steal data immediately, but to . If the application takes exactly 5 seconds longer than usual to respond when this string is entered, the attacker knows the database is vulnerable to SQL injection [2]. Once confirmed, they can use similar time-based techniques to extract sensitive data one character at a time. How to Protect Your System