Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: $user_name = "root"; $password = "lush1234"; $database = "LUSH"; $server = "localhost"; $db_handle = mysql_connect($server, $user_name, $password); $db_found = mysql_select_db($database, $db_handle); #initialize vars to empty $error = $cnu_firstname = $cnu_lastname = $cnu_username = $cnu_accountPa Source: http://pastie.org/pastes/8618431/download

Viewing all articles
Browse latest Browse all 2663

Trending Articles