Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: MySQL URI

$
0
0
Detected 1 occurrence(s) of ‘mysql:\/\/': ("include_path", ini_get("include_path").PATH_SEPARATOR.dirname(__FILE__)); include(dirname($_SERVER['DOCUMENT_ROOT']) . "/conf/database.php"); require( dirname($_SERVER['DOCUMENT_ROOT']) . "/libs/dbs/Connect.php"); $DB = new DbSimple_Connect('mysql://'.$DBUser.':'.$DBPassword.'@'.$DBHost.'/'.$DBName.''); $DB->setErrorHandler('databaseErrorHandler'); function databaseErrorHandler($message, $info) { if (!error_reporting()) return; echo "DB Error.<pre>"; print_r($info); echo "</pre>"; Source: http://pastebin.com/raw.php?i=sLQWPfFR

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>