Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)
First one found from of
| Public Sub SendToJoplin() | |
| Dim sToken As String, sURL As String | |
| Dim sURLNotes, sURLResources, sEscapedBody, sJSONString, sFolderID As String | |
| Dim objItem As Outlook.MailItem | |
| sToken = "REPLACE ME WITH YOUR TOKEN" | |
| sURL = "http://127.0.0.1:41184" | |
| sURLNotes = sURL & "/notes?token=" & sToken | |
| sURLResources = sURL & "/resources?token=" & sToken |
| String.prototype.strspn = function (chars, start, length) { | |
| var end; | |
| if (start == undefined) | |
| start = 0; | |
| else if (start < 0) | |
| start += this.length; | |
| if (length == undefined) | |
| length = this.length; |
Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)
First one found from of
| server { | |
| index index.php; | |
| set $basepath "/var/www"; | |
| set $domain $host; | |
| # check one name domain for simple application | |
| if ($domain ~ "^(.[^.]*)\.dev$") { | |
| set $domain $1; | |
| set $rootpath "${domain}"; |
| nginx/ | |
| !nginx/.gitkeep | |
| !nginx/logs/.gitkeep | |
| src/ | |
| tmp/ |
| #!/usr/bin/python | |
| # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
| # The author disclaims copyright to this source code. | |
| # | |
| # Modified slightly by Andreas Thienemann <athienemann@schubergphilis.com> for clearer exploit code | |
| # and 64k reads | |
| # | |
| # This version of the exploit does write received data to a file called "dump" in the local directory | |
| # for analysis. |