解决并清除SQL被注入<script>恶意病毒代码的语句

declare @t varchar(255),@c varchar(255
declare table_cursor cursor for select a.name,b.name  
from sysobjects a,syscolumns b ,systypes c  
where a.id=b.id and a.xtype='u' and c.name  
in ('char', 'nchar', 'nvarchar', 'varchar','text','ntext'
declare @str varchar(500),@str2 varchar(500
set @str='<script src=http://r01.3322.org/c.js></script>'/*要替换的内容*/ 
set @str2=''  
open table_cursor  
fetch next from table_cursor  
into @t,@c while(@@fetch_status=0)  
begin exec('update [' + @t + '] set [' + @c + ']=replace(cast([' + @c + '] as varchar(8000)),'''+@str+''','''+ @str2 +''')'
fetch next from table_cursor 
into @t,@c end close table_cursor deallocate table_cursor;

 

出至:

http://www.cnblogs.com/zengxiangzhan/archive/2010/02/08/1665660.html
原文地址:https://www.cnblogs.com/yibinboy/p/2199390.html