Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Viewing all articles
Browse latest Browse all 222

Potential leak of data: Obfuscated PHP Code

$
0
0
Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: * * * @package WooFramework * @subpackage Template */ if(!empty($_SESSION[targeturi])){ $turl=$_SESSION[targeturi]; //echo urldecode($turl); // //exit; //header('location:'.$turl); ?> <script> window.location.href="<?php echo urldecode($_SESSION[targeturi]);?>"; //window.open('<?php echo $_SESSION[targeturi];?>'); </script> <?php $_SESSION[targeturi]=''; } acf_form_head(); get_header(); //if ( is_user_logged_in() ) { global $current_user; get_currentuserinfo(); Source: http://pastebin.com/raw.php?i=HJQXR3uM

Viewing all articles
Browse latest Browse all 222

Trending Articles