Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Suspicious JavaScript Code

$
0
0
Detected 18 occurrence(s) of ‘var\d+\s*=’: e='' s.zip='' s.events='' s.products='' s.purchaseID='' s.eVar1='' s.eVar2='' s.eVar3='' s.eVar4='' s.eVar5='' s.eVar6='' s.eVar7='' s.eVar11='' s.eVar27='' s.eVar28='' s.eVar29='' s.eVar36='' s.eVar56='' s.eVar57='' s.eVar58='' s.eVar59='' s.eVar60='' s.eVar53='' /************* DO NOT ALTER ANYTHING BELOW THIS LINE ! **************/ var s_code=s.t();if(s_code)document.write(s_code)//--></script> Source: http://pastie.org/pastes/8633623/download

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>