Quantcast
Channel: Obfuscated PHP Code – LeakedIn
Browsing all 222 articles
Browse latest View live

Potential leak of data: Obfuscated PHP Code

Detected 2 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: ection" value="somesection"> <select name="school" class="school" id="school1"> <?php $lengthArray = count($Array); for ($k =...

View Article


Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <?php...

View Article


Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <?php $codelock_decrypter["filename"] = __FILE__;...

View Article

Potential leak of data: Obfuscated PHP Code

Detected 2 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: ,$ftppass,$chan); } } } } exit; } } if ($count == $num-1) { &msg("$chan","$rcilogo6$engine 1$dork 2Done... "); } } } } sub...

View Article

Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <?php...

View Article


Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: amp;x=boom">Boom</a>&nbsp;&nbsp;</ul></div><br><br> <?php if(isset($_GET['x']) &&...

View Article

Potential leak of data: Obfuscated JavaScript Code

Detected 1 occurrence(s) of ‘javascript.*eval\(‘: ndefined"){addStyle(q)}else{var z=document.createElement("style");z.type="text/css";z.appendChild(document.createTextNode(q));var...

View Article

Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <?php...

View Article


Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: GIF89aG <?php...

View Article


Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: >&x=phpini">Safe Mode</a> <a href="?<?php echo "y=".$pwd; ?>&x=config">Config Sh3ll</a> <a...

View Article

Potential leak of data: PHP Remote Code Execution

Detected 8 occurrence(s) of ‘\s+(system|popen|shellexec|exec).*\$(_GET|_POST|_COOKIE|_REQUEST|HTTP_POST_VARS)’: t'> Port: <input type='text' name='port'> <input type='submit'...

View Article

Potential leak of data: Obfuscated JavaScript Code

Detected 1 occurrence(s) of ‘javascript.*eval\(‘: NK</td><td style=\"text-align:center;\">".$owner."</td><td>".get_perms($pwd)."</td><td...

View Article

Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <?php...

View Article


Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: GIF89aG <?php...

View Article

Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <?php if(!function_exists("TC9A16C47DA8EEE87")){function...

View Article


Potential leak of data: Obfuscated JavaScript Code

Detected 1 occurrence(s) of ‘javascript.*eval\(‘: ndefined"){addStyle(q)}else{var z=document.createElement("style");z.type="text/css";z.appendChild(document.createTextNode(q));var...

View Article

Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: <?php...

View Article


Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: $packet); return stream_get_contents($sock); } $payload = "--o0oOo0o\r\n"; $payload .= "Content-Disposition: form-data; name=\"files[]\";...

View Article

Potential leak of data: Obfuscated JavaScript Code

Detected 1 occurrence(s) of ‘javascript.*eval\(‘: CJjYWNoZSIpIG9yICFzdHJpc3RyKCRyZWZlcmVyLCJpbnVybCIpKXsNCmhlYWRlcigiTG9jYXRpb246IGh0dHA6Ly9ob2x5dy5kZG5zLm1lLnVrLyIpOw0KZXhpdCgpOw0KfQp9Cn0NCn0NCn0="));...

View Article

Potential leak of data: Obfuscated PHP Code

Detected 1 occurrence(s) of ‘\?php.*(eval|urldecode)\(.*\>’: | // | cInvoice is commericial product, a valid license is required to use the | // | the software legally. | //...

View Article
Browsing all 222 articles
Browse latest View live