Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Obfuscated JavaScript Code

$
0
0
Detected 1 occurrence(s) of ‘javascript.*eval\(‘: ptEngine.findMainMethod(JavaScriptEngine.java:290) at com.l2jserver.script.java.JavaScriptEngine.findMainClass(JavaScriptEngine.java:262) at com.l2jserver.script.java.JavaScriptEngine.parseMain(JavaScriptEngine.java:213) at com.l2jserver.script.java.JavaScriptEngine$JavaCompiledScript.eval(JavaScriptEngine.java:94) at ru.catssoftware.gameserver.scripting.L2ScriptEngineManager.executeScript(L2ScriptEngineManager.java:333) at ru.catssoftware.gameserver.scripting.L2ScriptEngineManager.executeScript(L2ScriptEngineManager.java:306) at ru.ca Source: http://pastebin.com/raw.php?i=Zc65Xp5M

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>