Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: name&&$password) //set the variables $username = mysqli_real_escape_string($con,$_POST['user_name']); $password = mysqli_real_escape_string($con,$_POST['pass']); } $query = mysqli_query($con,"SELECT * FROM `websiteusers` WHERE username ='$user_name' AND password ='$pass'"); $numrows = mysqli_num_rows($query); if ($numrows!==0) { //loop while ($row = mysql_fetch_assoc($query)) { $username = $row['username']; $password = $row['password']; $_SESSION['SESS_LOGGEDIN'] = 1; $_SESSIO Source: http://pastebin.com/raw.php?i=uWUmZqeD

Viewing all articles
Browse latest Browse all 2663

Trending Articles