This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function bindAutocomplete() { | |
var storedValue = " "; | |
var validOptions = []; | |
//console.log("hellllloo1111111111"); | |
//console.log($(this).children(':first').val()); | |
$('.auto_complete_cve').customMenuComplete({ | |
source: function (request, response) { | |
//console.log($(this).context); | |
//var search_field_id = $(this).val(); | |
$.ajax({ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$mysqli = connect_to_mysql("includes/db_connection.cfg"); | |
$user_creation_sql = "INSERT INTO users (username) VALUES (?)"; | |
$stmt = $mysqli->prepare( $user_creation_sql ); | |
$stmt->bind_param("s", $username); | |
//$username = "varun"; | |
//$stmt->bind_param("s", $username); | |
$stmt->execute(); | |
echo $stmt->error . "this is the error on line xxx"; | |
$stmt->close(); | |
// Obtain the incremented value of the user_id. prepend sv to it and store it in a variable. Use this variable later below for local_id storage |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// The "RESPONSE" I see in google dev tools for the "POST" done by js function on the php page above is | |
<br /> | |
<b>Notice</b>: Array to string conversion in <b>C:\Users\vvikramjhu\Downloads\Airius misc Sep and onwards\safeview_www\www\googleLoginTokenStore.php</b> on line <b>11</b><br /> | |
printing Array object Array | |
( | |
[code] => 4/DRvNJilHCc7gJKaDNKnY-mHJ3QBTlQTvPmxZLULVNBw.AqmiVz-iDIAbJvIeHux6iLb_DbxzmQI | |
[state] => 043c00e6c7ff021e8cc4d394d3264cb5 | |
) | |
<br /> | |
<b>Fatal error</b>: Using $this when not in object context in <b>C:\Users\vvikramjhu\Downloads\Airius misc Sep and onwards\safeview_www\www\includes\google-api-php-client-master\src\Google\Client.php</b> on line <b>624</b><br /> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
root@vagrant-ubuntu-trusty-64:/home/vagrant# docker run --name some-mysql -e MYSQL_ROOT_PASSWORD=mysecretpassword -d mysql 2014/11/16 01:39:47 Error response from daemon: Conflict, The name some-mysql is already assigned to 3d153aa71f66. You have to delete (or rename) that container to be able to assign some-mysql to a container again. | |
root@vagrant-ubuntu-trusty-64:/home/vagrant# docker run -it --link some-mysql:mysql --rm mysql sh -c 'exec mysql -h"$MYSQL_PORT_3306_TCP_ADDR" -P"$MYSQL_PORT_3306_TCP_PORT" -uroot -p"$MYSQL_ENV_MYSQL_ROOT_PASSWORD"' | |
2014/11/16 01:39:53 Error response from daemon: Cannot start container 4634f0bd1bc7ceb042bbd6d5268ed7314bed5be8e0ed6e770e0273dfcd088562: Cannot link to a non running container: /some-mysql AS /focused_brattain/mysql | |
root@vagrant-ubuntu-trusty-64:/home/vagrant# docker restart 3d153aa71f66 | |
3d153aa71f66 | |
root@vagrant-ubuntu-trusty-64:/home/vagrant# docker ps | |
CONTAINER ID IMAGE COMMAND |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/expect | |
2 set timeout 10 | |
3 set caPass "password1234" | |
4 spawn /etc/pki/tls/misc/CA -newca | |
5 expect "CA certificate filename (or enter to create)" | |
6 send "\r" | |
7 expect "Enter PEM pass phrase:" | |
8 send "$caPass\r" | |
9 expect "Verifying - Enter PEM pass phrase:" | |
10 send "$caPass\r" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/expect | |
2 expect "enter \[xx\]\n" | |
3 send "help" | |
4 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1 #!/usr/bin/expect | |
2 set timeout 12 | |
3 set certsLocation "/etc/pki/tls/certs" | |
4 set passPhrase "password1234" | |
5 if { [file exists "httpserverkey.pem"] } { | |
6 puts "httpserverkey.pem exists. Not creating !! " | |
7 } else { | |
8 spawn openssl genrsa -des3 -out httpserverkey.pem 2048 | |
9 expect "Enter pass phrase for httpserverkey.pem:" | |
10 send "$passPhrase\r" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash/expect | |
2 set certsLocation "/etc/pki/tls/certs" | |
3 set pass "password1234" | |
4 spawn openssl genrsa -des3 -out httpserverkey.pem 2048 | |
5 expect "Enter pass phrase for httpserverkey.pem: *" | |
6 send "$pass" | |
7 expect "Verifying - Enter pass phrase for httpserverkey.pem: " | |
8 send "$pass" | |
9 #spawn openssl req -new -key httpserverkey.pem -out httpserver.csr | |
10 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
counta = 0 | |
countb = 0 | |
countc = 0 | |
with open( "a.txt", 'a') as a: | |
with open( "b.txt", 'a') as b: | |
with open( "c.txt", 'a') as c: | |
# Iterate over readlines from myFile.xml and parse data | |
if ( counta == 300000 ): | |
with open( "a1.txt" , 'a') as a1: | |
a1.write()... |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
CVE-2011-2413,; 4.3,; NETWORK,; MEDIUM,; NONE,; NONE,; PARTIAL,; NONE,; http://nvd.nist.gov,; 2014-10-22T15:24:56.097-04:00,; Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.,; 2014-10-20T10:55:03.420-04:00,; 2014-10-22T15:24:56.443-04:00 |