Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Viewing all articles
Browse latest Browse all 222

Potential leak of data: Obfuscated PHP Code

$
0
0
Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <input type="text" value="<?php=$_SERVER["HTTP_REFERER"] ?>" /> <a href="report.php?url=<?php echo urlencode($_SERVER['REQUEST_URI']) ?>">Report this URL</a> <input type="text" name="url" value="<?php echo htmlentities(urldecode($_GET['url'])); ?>" /> <?php echo '<input type="text" disabled value="' . $_SERVER["HTTP_REFERER"] . '" />'; ?> $(document).ready(function() { last_page = document.referrer; }); Source: http://pastebin.com/raw.php?i=4VV7S8xf

Viewing all articles
Browse latest Browse all 222

Trending Articles