Well im seeing something else now.
Version: '5.6.21-log' socket: '/var/lib/mysql/mysql.sock' port: 3306 MySQL Community Server (GPL)
2014-09-30 15:05:26 836401 [Warning] Unsafe statement written to the binary log using statement format since BINLOG_FORMAT = STATEMENT. The statement is unsafe because it uses a LIMIT clause. This is unsafe because the set of rows included cannot be predicted. Statement: UPDATE `wpShop_postmeta` SET meta_value=meta_value+1 WHERE meta_key='hits' AND post_id='248' LIMIT 1
2014-09-30 15:05:42 836401 [Warning] Unsafe statement written to the binary log using statement format since BINLOG_FORMAT = STATEMENT. The statement is unsafe because it uses a LIMIT clause. This is unsafe because the set of rows included cannot be predicted. Statement: UPDATE `wpShop_postmeta` SET meta_value=meta_value+1 WHERE meta_key='hits' AND post_id='189' LIMIT 1
Version: '5.6.21-log' socket: '/var/lib/mysql/mysql.sock' port: 3306 MySQL Community Server (GPL)
2014-09-30 15:05:26 836401 [Warning] Unsafe statement written to the binary log using statement format since BINLOG_FORMAT = STATEMENT. The statement is unsafe because it uses a LIMIT clause. This is unsafe because the set of rows included cannot be predicted. Statement: UPDATE `wpShop_postmeta` SET meta_value=meta_value+1 WHERE meta_key='hits' AND post_id='248' LIMIT 1
2014-09-30 15:05:42 836401 [Warning] Unsafe statement written to the binary log using statement format since BINLOG_FORMAT = STATEMENT. The statement is unsafe because it uses a LIMIT clause. This is unsafe because the set of rows included cannot be predicted. Statement: UPDATE `wpShop_postmeta` SET meta_value=meta_value+1 WHERE meta_key='hits' AND post_id='189' LIMIT 1