it happened everytime mod security was reading it as a hacjk atrtack
hesres the output
[Sun Feb 15 17:58:43.960174 2015] [:error] [pid 26970] [client 68.233.224.175] ModSecurity: Access denied with code 403 (phase 2). Pattern match "(?i:\\\\b(?:t(?:able_name\\\\b|extpos[^a-zA-Z0-9_]{1,}\\\\()|(?:a(?:ll_objects|tt(?:rel|typ)id)|column_(?:id|name)|mb_users|object_(?:id|(?:nam|typ)e)|pg_(?:attribute|class)|rownum|s(?:ubstr(?:ing){0,1}|ys(?:c(?:at|o(?:lumn|nstraint)s)|dba|ibm|(?:filegroup|o ..." at ARGS_NAMES:user_password. [file "/var/cpanel/cwaf/rules/cwaf_02.conf"] [line "299"] [id "211540"] [msg "COMODO WAF: Blind SQL Injection Attack"] [data "Matched Data: user_password found within ARGS_NAMES:user_password: user_password"] [severity "CRITICAL"] [hostname "www.exposetheabuse.com"] [uri "/core/form_validate/__ajax=1"] [unique_id "VOEko2icPqIAAGlaTK0AAAAT"]
--
soaringeagle
head dreadhead at dreadlocks site
glider pilot student and member/volunteer coordinator with freedoms wings international soaring for people with disabilities