Сегодня, зайда на одну из страниц Юзлесс ФАК увидел следующее:
Can't call method "selectall_arrayref" on an undefined value at /home/lj/cgi-bin/LJ/Pay/PromotionSlot/Journal.pm line 177, line 617. at /home/lj/cgi-bin/LJ/Pay/PromotionSlot/Journal.pm line 177 LJ::Pay::PromotionSlot::Journal::find_slots('LJ::Pay::PromotionSlot::Journal', 'HASH(0x2b76732fcde0)') called at /home/lj/cgi-bin/LJ/Pay/PromotionSlot/Journal.pm line 100 LJ::Pay::PromotionSlot::Journal::find_slot('LJ::Pay::PromotionSlot::Journal', 'slot_id', 'undef', 'class', 'journals', 'user', 'LJ::User=HASH(0x2b76733593b0)', 'type', 'entry', ...) called at /home/lj/cgi-bin/LJ/Pay/PromotionSlot.pm line 335 LJ::Pay::PromotionSlot::find_slot('LJ::Pay::PromotionSlot', 'class', 'journals', 'user', 'LJ::User=HASH(0x2b76733593b0)') called at /home/lj/cgi-bin/LJ/Widget/JournalPromo.pm line 66 LJ::Widget::JournalPromo::get_page_params('LJ::Widget::JournalPromo', 'ret_opts', 'HASH(0x2b7673224730)', 'journal', 'LJ::User=HASH(0x2b76733593b0)', 'remote', 'undef') called at /home/lj/cgi-bin/LJ/Widget/JournalPromo.pm line 44 LJ::Widget::JournalPromo::render_body('LJ::Widget::JournalPromo', 'remote', 'undef', 'journal', 'LJ::User=HASH(0x2b76733593b0)', 'ret_opts', 'HASH(0x2b7673224730)') called at /home/lj/cgi-bin/LJ/Widget.pm line 136 eval {...} called at /home/lj/cgi-bin/LJ/Widget.pm line 109 LJ::Widget::render('LJ::Widget::JournalPromo', 'remote', 'undef', 'journal', 'LJ::User=HASH(0x2b76733593b0)') called at /home/lj/cgi-bin/LJ/Controller/Entry.pm line 693 LJ::Controller::Entry::process('LJ::Controller::Entry', 'ARRAY(0x2b767334bff0)') called at /home/lj/cgi-bin/Apache/LiveJournal.pm line 490 eval {...} called at /home/lj/cgi-bin/Apache/LiveJournal.pm line 488 Apache::LiveJournal::__ANON__('Apache2::RequestRec=SCALAR(0x2b7673220910)') called at -e line 0 eval {...} called
Что полезного смогут извлечь "хакеры" из приведённого текста? Мои пароли? Как поломать Интернет? Особо интересует HASH