Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Viewing all articles
Browse latest Browse all 222

Potential leak of data: Obfuscated PHP Code

$
0
0
Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: >&nbsp;&nbsp; <strong>ISBN: </strong><?php printf( $item['volumeInfo']['industryIdentifiers'][0]['identifier']); ?></td> <td><p><input type="submit" name="select" value="Select" id="returnvalues"/></p> <img src="<?php printf( rawurldecode($item['volumeInfo']['imageLinks']['smallThumbnail'])); ?>" /> </td> <tr><td style="width:420px"><p><strong>Description: </strong><?php printf( $item['volumeInfo']['description']); ?><br /></p></td> </tr> </tr> <?php } } else Source: http://pastebin.com/raw.php?i=4ei10Xb4

Viewing all articles
Browse latest Browse all 222

Trending Articles