Linux iad1-shared-b7-18 6.6.49-grsec-jammy+ #10 SMP Thu Sep 12 23:23:08 UTC 2024 x86_64
Apache
: 67.205.6.31 | : 216.73.216.47
Cant Read [ /etc/named.conf ]
8.2.29
fernandoquevedo
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
usr /
local /
wp /
php /
WP_CLI /
Fetchers /
[ HOME SHELL ]
Name
Size
Permission
Action
Base.php
1.15
KB
-rw-r--r--
Comment.php
636
B
-rw-r--r--
Post.php
568
B
-rw-r--r--
Signup.php
1.36
KB
-rw-r--r--
Site.php
986
B
-rw-r--r--
User.php
1.26
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Signup.php
<?php namespace WP_CLI\Fetchers; /** * Fetch a signup based on one of its attributes. */ class Signup extends Base { /** * The message to display when an item is not found. * * @var string */ protected $msg = "Invalid signup ID, email, login, or activation key: '%s'"; /** * Get a signup. * * @param int|string $signup * @return object|false */ public function get( $signup ) { return $this->get_signup( $signup ); } /** * Get a signup by one of its identifying attributes. * * @param string $arg The raw CLI argument. * @return object|false The item if found; false otherwise. */ protected function get_signup( $arg ) { global $wpdb; $signup_object = null; // Fetch signup with signup_id. if ( is_numeric( $arg ) ) { $result = $wpdb->get_row( $wpdb->prepare( "SELECT * FROM $wpdb->signups WHERE signup_id = %d", $arg ) ); if ( $result ) { $signup_object = $result; } } if ( ! $signup_object ) { // Try to fetch with other keys. foreach ( array( 'user_login', 'user_email', 'activation_key' ) as $field ) { // phpcs:ignore WordPress.DB.PreparedSQL $result = $wpdb->get_row( $wpdb->prepare( "SELECT * FROM $wpdb->signups WHERE $field = %s", $arg ) ); if ( $result ) { $signup_object = $result; break; } } } if ( $signup_object ) { return $signup_object; } return false; } }
Close