Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: require_once "app/Mage.php"; umask(0); Mage::app(); // require_once $_SERVER['DOCUMENT_ROOT'] . "/mage1/app/Mage.php"; // Customer Information $firstname = "krishana"; $lastname = "singh"; $email = "krish.bhati@gmail.com"; $password = "myverysecretpassword"; // Website and Store details $websiteId = Mage::app()->getWebsite()->getId(); $store = Mage::app()->getStore(); $customer = Mage::getModel("customer/customer"); $customer->website_id = $websiteId; $customer->setStore($store); $mageRunCode = isse Source: http://pastebin.com/raw.php?i=Pd889mXS

Viewing all articles
Browse latest Browse all 2663

Trending Articles