Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': <html> <body> <?php $server = "mysql14.000webhost.com"; $database = "a1680504_db"; $username = "a1680504_user"; $password = "broncos123"; mysql_connect($server, $username, $password) or die(mysql_error()); mysql_select_db($database); $db_handle = mysql_connect($server, $username, $password); $db_found = mysql_select_db($database, $db_handle); if(isset($_POST['submit'])) { if(! Detected 2 occurrence(s) of ‘mysql_[p]*connect\([“‘]{0,1}[a-z0-9\-\.\$]+[“‘]{0,1}\s*,': l> <body> <?php $server = "mysql14.000webhost.com"; $database = "a1680504_db"; $username = "a1680504_user"; […]

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>