Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: xe_exibe=mysql_query($sql_exibe); while($reg=mysql_fetch_array($exe_exibe)){ if ($count>5) { $sql = "UPDATE oc_customer SET store_id='$store_id', firstname='$firstname', lastname='$lastname', email='$email', telephone='$telephone', fax='$fax', password='$password', salt='$salt', cart='$cart', wishlist='$wishlist', newsletter='$newsletter', address_id='$address_id', customer_group_id='$customer_group_id', ip='$ip', status='$status', approved='$approved', token='$token', date_added='$date_added', deslocado='1' WHERE Source: http://pastebin.com/raw.php?i=DcD120UF

Viewing all articles
Browse latest Browse all 2663

Trending Articles