Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: T['username']) && isset($_POST['password'])) { $username = $_POST['username']; $password = $_POST['password']; //checks if username and password are in database $data = mysql_query("SELECT * FROM LoginInfo WHERE username='$username' AND password='$password'") or die(mysql_error()); if(mysql_fetch_array($data)) { $_SESSION['username'] = $username; echo"<script>window.location.href = 'http://ryanc.computingboston.org/new_login/loggedin.php';</script>"; } //if username and passwo Source: http://pastebin.com/raw.php?i=g9pB5ZB1

Viewing all articles
Browse latest Browse all 2663

Trending Articles