Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: <?php Require('connect.php'); if (isset($_POST['username']) && isset($_POST['password'])){ $username = $_POST['username']; $password = $_POST['password']; $query = "SELECT * FROM 'user' WHERE username='$username' AND password='$password'"; $legit = mysql_query($query) or die(mysql_error()); $hej = mysql_num_rows($legit); if ($hej == 1){ header( 'Location: www.google.dk'); } else { echo "Forkert login oplysninger"; } } ?> Source: http://pastebin.com/raw.php?i=uTwp4b47

Viewing all articles
Browse latest Browse all 2663

Trending Articles