Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Viewing all articles
Browse latest Browse all 222

Potential leak of data: Obfuscated PHP Code

$
0
0
Detected 10 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: else echo "\t\t\t\t\t\t".'<option value="'.$lang.'">'.$lang.'</option>'."\n"; } ?> </select></span> </div> </div> <?php } ($hook = get_hook('rg_register_pre_group_end')) ? eval($hook) : null; ?> </div> <?php ($hook = get_hook('rg_register_group_end')) ? eval($hook) : null; ?> <div class="frm-buttons"> <span class="submit primary"><input type="submit" name="register" value="<?php echo $lang_profile['Register'] ?>" /></span> </div> </form> </div> <?php ($hook = get_hook('rg_end')) ? eval($hook) […]

Viewing all articles
Browse latest Browse all 222

Trending Articles