Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: <?php session_start(); ob_start(); error_reporting(E_ERROR | E_WARNING | E_PARSE); ini_set("display_errors", 1); set_time_limit(10); // database connection $sql_ip = "localhost"; $sql_user = "mysql_user"; $sql_password = "mysql_password"; $sql_database = "database_name"; $dbc = mysql_connect($sql_ip, $sql_user, $sql_password); if (!$dbc) { die('Could not connect: ' . mysql_error()); } mysql_select_db($sql_database); if($_GET["order"]){ if($_SESSION["orders"][$_GET["ord Source: http://pastebin.com/raw.php?i=hFyqWF4s

Viewing all articles
Browse latest Browse all 2663

Trending Articles