Quantcast
Channel: Simple Password – LeakedIn
Viewing all 2663 articles
Browse latest View live

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: hValue("@email", email); command.Parameters.AddWithValue("@password", password); connection.Open(); var result = command.ExecuteScalar(); } } string email ="YourEmail@sample.com" //Give your email id to check string password ="Test" //Give your Password to check SqlConnection connection = new SqlConnection(ConfigurationManager.ConnectionStrings["SQLServerConnection"].ConnectionString); SqlCommand command = connection.CreateCommand(); command.CommandText = "SEL Source: http://pastebin.com/raw.php?i=VmXJYsDc

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ope.Subtree); string oracleNetDescription = Encoding.Default.GetString(des.FindOne().Properties["orclnetdescstring"][0] as byte[]); using System.DirectoryServices; ... DirectoryEntry de = new DirectoryEntry(); de.Username = "username@mysite.com"; de.Password = "password"; de.Path = "LDAP://DC=mysite,DC=com"; de.AuthenticationType = AuthenticationTypes.Secure; DirectorySearcher des = new DirectorySearcher(de); private static string ResolveServiceNameLdap(string serviceName) { string tnsAdminPath = Path.Combine(@"C: Source: http://pastebin.com/raw.php?i=v5nH307V

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: l_select_db('moodle_23') or die(mysql_error()); $salt = 'MG.b.;w>0B)3c.^:OqDd#?^h'; //change with your salt $password = md5($_POST['password'] . $salt); $query = "SELECT * FROM mdl_user WHERE username = '{$_POST['username']}' AND password = '$password'"; $result = mysql_query($query) or die(mysql_error()); echo '<pre>'; while ($row = mysql_fetch_assoc($result)) { print_r($row); } } ?> <form action='' method="post"> <p>Username = […]

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: addr = 'ilovegta4cod@gmail.com' toaddrs = 'ilovegta4cod@gmail.com' msg = 'JOEY' list = ['calebfangsly@gmail.com', 'therarehacks@gmail.com', 'support@toontownrewritten.com'] # Credentials (if needed) username = 'ilovegta4cod@gmail.com' password = 'ac130sftw' # The actual mail send server = smtplib.SMTP('smtp.gmail.com:587') server.starttls() server.login(username,password) while 1 = 1: for email in list: server.sendmail(fromaddr, toaddrs, msg) server.quit() Source: http://pastebin.com/raw.php?i=Vm7Tx8vK

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: ####KiloWatt#### ssh root login: ssh root@130.193.82.42 password = r00tistheking enjoy :) Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: ####KiloWatt#### ssh root login: ssh root@130.193.82.42 password = r00tistheking enjoy :) Source: http://pastie.org/pastes/8670607/download

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: Password:Qx67978Q Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: Password:Qx67978Q Source: http://pastie.org/pastes/8672550/download

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: y_app", "host":'mongodb://<user>:<password>@alex.mongohq.com:10043/app12345678'} from flask import Flask from mongoengine import connect app = Flask(__name__) app.config["MONGODB_DB"] = 'app12345678' connect( 'app12345678', username='heroku', password='a614e68b445d0d9d1c375740781073b4', host='mongodb://<user>:<password>@alex.mongohq.com:10043/app12345678', port=10043 ) Source: http://pastebin.com/raw.php?i=CZF7qjvw

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: //////////////////////////// // Mule Specific vars /////////////////////////////////////////////////// var MuleGamePassword = "MHDynamo101"; // Consistant through all games. Password automatically used for the Mule item transfer game var muleAccountPassword = "cosmovoid0"; // for all mule accounts. It will use this password when creating the Mule account var CharPrefix = "Eddingtog"; // Name of […]

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: fromaddress = 'kbaprogrammerstest@gmail.com' toaddress = email message = 'The sensor has detected a change in heat within your facilty' username = 'kbaprogrammerstest@gmail.com' password = 'passwordkba' server = smtplib.SMTP('smtp.gmail.com:587') server.ehlo() server.startls() server.login(username, password) server.sendmail(fromad Source: http://pastebin.com/raw.php?i=fSqyE7fb

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: 2:49:19 52 Quit 140202 22:49:36 53 Connect root@localhost on 53 Init DB "..." 53 Query SELECT * FROM users WHERE email='Salamander014@gmail.com' LIMIT 1 53 Query SELECT * FROM users WHERE email='Salamander014@gmail.com' AND password='388ae73cf3c0fa31e9f8a3c581c9906ad0786473f41cc9515b52e62e59553d0793c083dbd3bd489d5394b2b57e517b79e1b302ef65d97faf618cb0a5ae831105' 53 Query INSERT INTO transactions VALUES (NULL, 'Salamander014@gmail.com', '1', 'February 2, 2014, 10:49 pm') 53 Quit 140202 […]

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: r Country: BRAZIL City: SAO PAULO SSID: area BSSID: 34:08:04:b4:ea:8a Broadcast address: 192.168.0.255 DNS(1) address: 200.204.0.10 DNS(2) address: 200.204.0.138 Mask: 255.255.255.0 Gateway: 192.168.0.1 State: CONNECTED Network ID: 57 localhost: 127.0.0.1 Password: 9gfr1995mrs PIN: < still secret > Detected 1 occurrence(s) of ‘^\s*pin[code]*\s*(:|=|is|was)\s': : SAO PAULO SSID: area BSSID: 34:08:04:b4:ea:8a […]

Potential leak of data: Simple Password

$
0
0
Detected 4 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: Group expect {post group_url.sub(/(.*)(\..*)/, '\1/leave\2')}.to change(GroupMembership, :count).by(-1) # logs out delete destroy_user_session_url # first user post user_session_path, format: :json, user: {email: @user.email, password: 'we-secret'} # reveals itself post group_url.sub(/(.*)(\..*)/, '\1/reveal_me\2') get group_url resp = JSON.parse(response.body) resp['members'].first['hide_membership'].should be_false # deletes the group expect {delete group Source: http://pastie.org/pastes/8694280/download

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: f leecher failed to join. In seconds. // ============================================================================= // Game password (leave blank if none) // ============================================================================= var gamepassword = "123"; // ============================================================================= // UseCDKeyChangeTrick : // if true, the follow bot will say his gamename/gamepwd (set in the OOG) in chat before each game // in order to […]

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: http://ma.brazzers.com/postlogin/ USER:PASS rmnp21:colorado PotentPotables11:gd003278 drudge : ew7phyg4 jcrmtc:121801 gartrellp:haggard1 maxter72:maximus dragon66 : sodoff rinoe6:e72008 Username : rinoe6 Password : e72008 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: http://ma.brazzers.com/postlogin/ USER:PASS rmnp21:colorado PotentPotables11:gd003278 drudge : ew7phyg4 jcrmtc:121801 gartrellp:haggard1 maxter72:maximus dragon66 : sodoff rinoe6:e72008 Username : rinoe6 Password : e72008 Source: http://pastebin.com/raw.php?i=GEXG8vr5

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: d Recovery Record Language: English Fix.....: Crack/Serial MESMERiZE http://www.filefactory.com/file/2e3d8pzivygh/n/-HyprChm8.0.10-.rar http://uploaded.net/file/822xtsda/-HyprChm8.0.10-.rar http://turbobit.net/8uay4hrnugmi/-HyprChm8.0.10-.rar.html PassWord: 4shar1ng Source: http://pastebin.com/raw.php?i=QgDDVsbN

Potential leak of data: MasterCard Credit Card

$
0
0
Detected 1 occurrence(s) of ‘\s+5[1-5][0-9]{14}\s+’: Number: 5397650001480187 EXP: 0415 CVV: 962 Name: John Incantalupo Country: United States State: NA ZIP: 07871 City: Sparta Street: 47 Whippoorwill Lane Phone: N/A Bank: EDS CREDIT UNION STANDART Pass : zxczxc123 Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: Number: 5397650001480187 EXP: 0415 CVV: 962 Name: John Incantalupo Country: United States State: […]

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: Uploaded.to 04/02/2014 Username: 10170758 Password: xjhql739 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: Uploaded.to 04/02/2014 Username: 10170758 Password: xjhql739 Source: http://pastebin.com/raw.php?i=vZUTBnK9

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: Letitbit.com 04/02/2014 Username: poggi37 Password: poggi37 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: Letitbit.com 04/02/2014 Username: poggi37 Password: poggi37 Source: http://pastebin.com/raw.php?i=1EXEixJb

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: mbedded'}) if cherrypy.__version__.startswith('3.0') and cherrypy.engine.state == 0: cherrypy.engine.start(blocking=False) atexit.register(cherrypy.engine.stop) def initServer(): global db db=MySQLdb.connect(host="localhost", user="root",passwd="pass",db="Penguin") class Login(object): def index(self): return 'Login Page' index.exposed = True class Root(object): login = Login(); def index(self): # Sample page that displays the number of records in "table" # O Source: http://pastebin.com/raw.php?i=zB4EpBHV

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ib uri="http://java.sun.com/jsp/jstl/core" prefix="c"%> <%@page contentType="text/html" pageEncoding="UTF-8"%> <%@page import="java.sql.*"%> <sql:setDataSource driver="oracle.jdbc.driver.OracleDriver" url="jdbc:oracle:thin:@localhost:1521:XE" user="system" password="ankit" var="db" scope="request" /> <sql:query dataSource="${db}" var="countrys" sql="SELECT * FROM country" /> <sql:query dataSource="${db}" var="states" sql="SELECT * FROM state WHERE countryid=${param['countryid']}" /> <sql:query dataSource="${db}" var="cities Detected 1 occurrence(s) of ‘dbc:oracle:thin:’: java.sun.com/jsp/jstl/sql" prefix="sql"%> <%@taglib uri="http://java.sun.com/jsp/jstl/core" prefix="c"%> <%@page contentType="text/html" pageEncoding="UTF-8"%> […]
Viewing all 2663 articles
Browse latest View live




Latest Images