Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: avigateToURL; import flash.events.MouseEvent; var urlVariables:URLVariables = new URLVariables; var pi:pizza=new pizza(); var totalAmt:Number; totalAmt=pi.totalPrice; urlVariables.totalAmount = totalAmt;//"" contains what should be passed //urlVariables.password = "testpass";//""contains what should be passed var urlRequest:URLRequest = new URLRequest("http://172.21.147.103/csc207/bcg2g2/customise.php"); urlRequest.data = urlVariables; sendToURL(urlRequest) <?php $total = $_GET["totalAmount"]; //$pass = $_GET Source: http://pastebin.com/raw.php?i=ajb792FX

Viewing all articles
Browse latest Browse all 2663

Trending Articles