Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: MySQL Connect Information

$
0
0
Detected 1 occurrence(s) of ‘mysql_[p]*connect\(["']{0,1}[a-z0-9\-\.\$]+["']{0,1}\s*,': else { $sticky = 0; } $postedby = clear($_POST['postedby']); $subject = clear($_POST['subject']); $news = clear($_POST['news']); $zichtbaar = clear($_POST['visible']); $sticky = clear($_POST['sticky']); $date = mktime(); mysql_connect('host','user','pass'); mysql_select_db('db'); if(mysql_query("INSERT INTO news VALUES ('', '$postedby', '$news', '$subject', '$date' , '$sticky', '$zichtbaar')")) echo 'Het nieuws is geplaatst!'; mysql_close(); } $news = mysql_real_e Source: http://pastebin.com/raw.php?i=DMrjjpgD

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>