Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: PHP Filesystem Interaction

$
0
0
Detected 2 occurrence(s) of ‘(fopen|file)\(.*\$(GET|POST)’: $_FILES['image']['tmp_name']; if($post_title1=='' or $post_author1=='' or $post_keyword1=='' or $post_content1=='' or $post_image1=='') { echo "<script>alert('Any of the fields is empty')</script>"; exit(); } else { move_uploaded_file($image_tmp,"../images/$post_image1"); $update_query = "update posts set post_title='$post_title1', post_date='$post_date1',post_author='$post_author1', post_image='$post_image1',post_keyword='$post_keyword1',post_content='$post_content1' where post_id='$update_id'"; Source: http://pastebin.com/raw.php?i=7nnf1V70

Viewing all articles
Browse latest Browse all 2834

Trending Articles