Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: s' AND password = '%s'" % (user, password)) if ugh: db.commit() return me() else: return index() @post('/register') @view('index.tpl') def register(): db = MySQLdb.connect(host='localhost', port=3306, user="root", passwd="XefraDef4s", db="a101") query = db.cursor() user = request.forms.get('reg_usr') passw = request.forms.get('reg_pass') email = request.forms.get('reg_email') passw2 = str(passw) password = hashlib.md5(passw2).hexdigest() reg = query.execu Source: http://pastie.org/pastes/8746937/download

Viewing all articles
Browse latest Browse all 2663

Trending Articles