Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: Simple Password

$
0
0
Detected 3 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: select_db($dbname) or DIE('Database name is not available!'); $userName=mysql_real_escape_string($_POST['username']); $passWord=md5(mysql_real_escape_string($_POST['password'])); $query = "SELECT id FROM member WHERE userName='$userName' and passWord='$passWord'"; $res = mysql_query($query); $rows = mysql_num_rows($res); if ($rows==1) { $_SESSION['userName'] = $_POST['username']; header("Location: securedpage.php"); } else { echo "user name and password not fo Source: http://pastebin.com/raw.php?i=ga6T1Aug

Viewing all articles
Browse latest Browse all 2834

Trending Articles