Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: function (Not In all versions of MySQL). $usr = mysql_real_escape_string($_POST['username']); $pas = hash('sha256', mysql_real_escape_string($_POST['password'])); $sql = mysql_query("SELECT * FROM members WHERE username='$usr' AND password='$pas' LIMIT 1"); if(mysql_num_rows($sql) == 1){ $row = mysql_fetch_array($sql); session_start(); $_SESSION['username'] = $row['username']; $_SESSION['logged'] = TRUE; header("Location: users_page.php"); Source: http://pastebin.com/raw.php?i=ebxsFsdr

Viewing all articles
Browse latest Browse all 2663

Trending Articles