Skip to content

Instantly share code, notes, and snippets.

function bindAutocomplete() {
var storedValue = " ";
var validOptions = [];
//console.log("hellllloo1111111111");
//console.log($(this).children(':first').val());
$('.auto_complete_cve').customMenuComplete({
source: function (request, response) {
//console.log($(this).context);
//var search_field_id = $(this).val();
$.ajax({
$mysqli = connect_to_mysql("includes/db_connection.cfg");
$user_creation_sql = "INSERT INTO users (username) VALUES (?)";
$stmt = $mysqli->prepare( $user_creation_sql );
$stmt->bind_param("s", $username);
//$username = "varun";
//$stmt->bind_param("s", $username);
$stmt->execute();
echo $stmt->error . "this is the error on line xxx";
$stmt->close();
// Obtain the incremented value of the user_id. prepend sv to it and store it in a variable. Use this variable later below for local_id storage
// The "RESPONSE" I see in google dev tools for the "POST" done by js function on the php page above is
<br />
<b>Notice</b>: Array to string conversion in <b>C:\Users\vvikramjhu\Downloads\Airius misc Sep and onwards\safeview_www\www\googleLoginTokenStore.php</b> on line <b>11</b><br />
printing Array object Array
(
[code] => 4/DRvNJilHCc7gJKaDNKnY-mHJ3QBTlQTvPmxZLULVNBw.AqmiVz-iDIAbJvIeHux6iLb_DbxzmQI
[state] => 043c00e6c7ff021e8cc4d394d3264cb5
)
<br />
<b>Fatal error</b>: Using $this when not in object context in <b>C:\Users\vvikramjhu\Downloads\Airius misc Sep and onwards\safeview_www\www\includes\google-api-php-client-master\src\Google\Client.php</b> on line <b>624</b><br />
root@vagrant-ubuntu-trusty-64:/home/vagrant# docker run --name some-mysql -e MYSQL_ROOT_PASSWORD=mysecretpassword -d mysql 2014/11/16 01:39:47 Error response from daemon: Conflict, The name some-mysql is already assigned to 3d153aa71f66. You have to delete (or rename) that container to be able to assign some-mysql to a container again.
root@vagrant-ubuntu-trusty-64:/home/vagrant# docker run -it --link some-mysql:mysql --rm mysql sh -c 'exec mysql -h"$MYSQL_PORT_3306_TCP_ADDR" -P"$MYSQL_PORT_3306_TCP_PORT" -uroot -p"$MYSQL_ENV_MYSQL_ROOT_PASSWORD"'
2014/11/16 01:39:53 Error response from daemon: Cannot start container 4634f0bd1bc7ceb042bbd6d5268ed7314bed5be8e0ed6e770e0273dfcd088562: Cannot link to a non running container: /some-mysql AS /focused_brattain/mysql
root@vagrant-ubuntu-trusty-64:/home/vagrant# docker restart 3d153aa71f66
3d153aa71f66
root@vagrant-ubuntu-trusty-64:/home/vagrant# docker ps
CONTAINER ID IMAGE COMMAND
#!/usr/bin/expect
2 set timeout 10
3 set caPass "password1234"
4 spawn /etc/pki/tls/misc/CA -newca
5 expect "CA certificate filename (or enter to create)"
6 send "\r"
7 expect "Enter PEM pass phrase:"
8 send "$caPass\r"
9 expect "Verifying - Enter PEM pass phrase:"
10 send "$caPass\r"
#!/usr/bin/expect
2 expect "enter \[xx\]\n"
3 send "help"
4
1 #!/usr/bin/expect
2 set timeout 12
3 set certsLocation "/etc/pki/tls/certs"
4 set passPhrase "password1234"
5 if { [file exists "httpserverkey.pem"] } {
6 puts "httpserverkey.pem exists. Not creating !! "
7 } else {
8 spawn openssl genrsa -des3 -out httpserverkey.pem 2048
9 expect "Enter pass phrase for httpserverkey.pem:"
10 send "$passPhrase\r"
#!/bin/bash/expect
2 set certsLocation "/etc/pki/tls/certs"
3 set pass "password1234"
4 spawn openssl genrsa -des3 -out httpserverkey.pem 2048
5 expect "Enter pass phrase for httpserverkey.pem: *"
6 send "$pass"
7 expect "Verifying - Enter pass phrase for httpserverkey.pem: "
8 send "$pass"
9 #spawn openssl req -new -key httpserverkey.pem -out httpserver.csr
10
counta = 0
countb = 0
countc = 0
with open( "a.txt", 'a') as a:
with open( "b.txt", 'a') as b:
with open( "c.txt", 'a') as c:
# Iterate over readlines from myFile.xml and parse data
if ( counta == 300000 ):
with open( "a1.txt" , 'a') as a1:
a1.write()...
CVE-2011-2413,; 4.3,; NETWORK,; MEDIUM,; NONE,; NONE,; PARTIAL,; NONE,; http://nvd.nist.gov,; 2014-10-22T15:24:56.097-04:00,; Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.,; 2014-10-20T10:55:03.420-04:00,; 2014-10-22T15:24:56.443-04:00