Software: Apache/2.2.3 (CentOS). PHP/5.1.6 uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44 uid=48(apache) gid=48(apache) groups=48(apache) Safe-mode: OFF (not secure) /usr/lib/openoffice.org/basis3.1/share/Scripts/javascript/HelloWorld/ drwxr-xr-x |
Viewing file: helloworld.js (642 B) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) | // Hello World in JavaScript importClass(Packages.com.sun.star.uno.UnoRuntime); importClass(Packages.com.sun.star.text.XTextDocument); importClass(Packages.com.sun.star.text.XText); importClass(Packages.com.sun.star.text.XTextRange); //get the document from the scripting context oDoc = XSCRIPTCONTEXT.getDocument(); //get the XTextDocument interface xTextDoc = UnoRuntime.queryInterface(XTextDocument,oDoc); //get the XText interface xText = xTextDoc.getText(); //get an (empty) XTextRange interface at the end of the text xTextRange = xText.getEnd(); //set the text in the XTextRange xTextRange.setString( "Hello World (in JavaScript)" ); |
:: Command execute :: | |
:: Shadow's tricks :D :: | |
Useful Commands
|
:: Preddy's tricks :D :: | |
Php Safe-Mode Bypass (Read Files)
|
--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0112 ]-- |