Quantcast
Channel: Simple Password – LeakedIn
Viewing all 2663 articles
Browse latest View live

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: origin username: abdoamer19@yahoo.com password: rocket21 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: origin username: abdoamer19@yahoo.com password: rocket21 Source: http://pastie.org/pastes/8981211/download

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: origin username: kimoamer65@yahoo.com password: rocket21 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: origin username: kimoamer65@yahoo.com password: rocket21 Source: http://pastie.org/pastes/8981214/download

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ort MySQLdb # connect db = MySQLdb.connect(host="localhost", user="root", passwd="xxxxxxx", db="world") cursor = db.cursor() val=xrange(1,1000,2) for x in val: print x import MySQLdb # connect db = MySQLdb.connect(host="localhost", user="root", passwd="xxxxxxx", db="world") cursor = db.cursor() for x in xrange(1,1000,2): cursor.execute('INSERT INTO table (mynumber) VALUES(' + str(x) + ');') Source: http://pastebin.com/raw.php?i=sjWdz4mf

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: oid Main(string[] args) { ExampleService.JavaServiceClient client = new ExampleService. JavaServiceClient(); client.ClientCredentials.UserName.UserName = "wcadmin"; client.ClientCredentials.UserName.Password = "wcadmin"; client.ClientCredentials.ServiceCertificate.SetDefaultCertificate( StoreLocation.CurrentUser, StoreName.TrustedPeople, X509FindType.FindBySubjectName, "syncgdc0221.syntel Source: http://pastebin.com/raw.php?i=xjeyXUhW

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: <td align="center"><c:out value="${row.comments}"></c:out></td> </tr> </c:forEach> <Context> <Resource name="jdbc/myderby" auth="Container" type="javax.sql.DataSource" username="root" password="root" driverClassName="org.apache.derby.jdbc.EmbeddedDriver" url="jdbc:derby:E:workspaceDerbyDerbyNewderbyDb;create=true" maxActive="100" maxIdle="30" maxWait="10000" removeAbandoned="true" /> </Context> <resource-ref> <descript Source: http://pastebin.com/raw.php?i=MFRgjNHx

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: <?php include("config.php"); $decoded = json_decode(file_get_contents("php://input")); $username = $decoded -> {"username"}; $password = $decoded -> {"password"}; $query = "SELECT u_id FROM pluma_user where password='$password' and username='$username'"; $result = mysql_query($query); $obj = array(); $check = false; while($row=mysql_fetch_assoc($result)){ $check = true; $obj["result"] = "ok"; Source: http://pastebin.com/raw.php?i=TGVaJrUt

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: local password = "5436" term.clear() term.setCursorPos(1,1) print("Welcome to Tieran.Net") print("") print("Please enter password to enter") if read("*") == password then redstone.setOutput("back", true) print("password correct!") sleep(5) redstone.setOut Source: http://pastebin.com/raw.php?i=jxctxNs1

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: .XX@hotmail.com Pass MrXX0900 iPMisterXX@gmail.com Mix020xiM sanookcubme@gmail.com Meclub007 nattapob@hotmail.com thuGbGz1994 4622 8760 1240 2130 Exp 09/17 694 1994 janenagap@gmail.com janenagapz@gmail.com rOckmanX6 Apple ID : appleur@apple.id.in.th Password : Appleur1234 siravid_41@hotmail.com 019864121 403,4294967108 http://appxs.ipmisterx.com/Xs777/ Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: .XX@hotmail.com Pass MrXX0900 iPMisterXX@gmail.com Mix020xiM sanookcubme@gmail.com Meclub007 nattapob@hotmail.com thuGbGz1994 4622 8760 1240 2130 […]

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: p_content" android:layout_centerHorizontal="true" android:layout_centerVertical="true"/> <EditText android:id="@+id/editPass" android:layout_width="match_parent" android:layout_height="wrap_content" android:password="true" android:hint="Password"> </EditText> <CheckBox android:id="@+id/checkbox_store" android:layout_width="wrap_content" android:layout_height="wrap_content" android:text="Store your data"/> <Button android:id=" Source: http://pastebin.com/raw.php?i=ZnhxgHiu

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: time def AddItem(): print "Added Item" print "ID:" + ID.get() print "Item Name:" + ItemName.get() print "Price Per Item:" + PricePerItem.get() print "Manufacturer:" + Manufacturer.get() cnx = mysql.connector.connect(user='root',password='cj92cj', database='INVENTORY', use_unicode=False) s = "INSERT INTO inventory (ID, Manufacturer, ItemName, PricePerItem, Quantity) VALUES({},{},{},{},1) ON DUPLICATE KEY UPDATE Quantity= Quantity + 1, Manufacturer […]

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: r.html http://rg.to/file/17435ff30a7ddb3d34111c641eb66780/-QBPOSMultiStre8.0R7RePck-.part2.rar.html http://turbobit.net/v72djk6mes8k/-QBPOSMultiStre8.0R7RePck-.part1.rar.html http://turbobit.net/9lnor8in45hk/-QBPOSMultiStre8.0R7RePck-.part2.rar.html PassWord: 4shar1ng Source: http://pastebin.com/raw.php?i=uu4MYHQe

Potential leak of data: Simple Password

$
0
0
Detected 3 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: r die ("change password failed"); $row = mysql_fetch_assoc($queryget); $oldpassworddb = $row['password']; //check two new passwords if ($newpassword==$repeatnewpassword) { //successs //change password in db $querychange = mysql_query("UPDATE members SET password='$newpassword' WHERE username='$user'"); session_destroy(); die("Your password has been changed. <a href='login.php'> Login Again</a>"); } else die("New password doesn't match!"); } else { […]

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: password: uhsummalummadoomalummayouassumingimahumanwhatigottadotogetitthroughtoyouimsuperhumaninnovativeandimmadeofrubbersothatanythingyousayisricochetingoffofmeanditllgluetoyouandimdevastatingmorethaneverdemonstrating867392948 Source: http://pastebin.com/raw.php?i=EnrvNBV2

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: llers/posts_controller.rb:22:in `block (2 levels) in index' app/controllers/posts_controller.rb:21:in `index' test/integration/user_flows_test.rb:14:in `block in <class:UserFlowsTest>' post_via_redirect "/users/login", username: users(:chloe).username, password: 'passpasspass' %a{href: user_path(post.user)}= post.user.username if post.user ----------------------------------------- UserFlowsTest: test_login_and_browse_site ----------------------------------------- Started GET "/users/login" for 127.0.0.1 at 2014-02-14 21 Source: http://pastebin.com/raw.php?i=sYhc59kE

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: Username: maryam.zarifis@campuscooks.com Password: hoopgoal11 Username: mitch.80@live.com Password: 22001144 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: Username: maryam.zarifis@campuscooks.com Password: hoopgoal11 Username: mitch.80@live.com Password: 22001144 Source: http://pastebin.com/raw.php?i=TY2HhDbs

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: // enable SMTP authentication $mail->Port = 25; // set the SMTP server port $mail->Host = "smtp.gmail.com"; // SMTP server $mail->Username = "yuliy.x.95@gmail.com"; // SMTP server username $mail->Password = "mypassword"; // SMTP server password $mail->IsSendmail(); // tell the class to use Sendmail $mail->AddReplyTo("k.yuliy@yahoo.it","First Last"); $mail->From = "name@domain.com"; $mail->FromName = "First Las […]

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: Bselne2X64RePckFIVE-.part5.rar.html http://turbobit.net/qqrjkvva1mrl/-W7Bselne2X64RePckFIVE-.part6.rar.html http://turbobit.net/lwq4a9aix5xu/-W7Bselne2X64RePckFIVE-.part7.rar.html http://turbobit.net/u5dlg7gj4mex/-W7Bselne2X64RePckFIVE-.part8.rar.html PassWord: 4shar1ng Source: http://pastebin.com/raw.php?i=fP3i89h9

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: cherylmshar@yahoo.com ID: CHERYLMSHAR or CMSHAR1CM Password: SAMPSON4 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: cherylmshar@yahoo.com ID: CHERYLMSHAR or CMSHAR1CM Password: SAMPSON4 Source: http://pastebin.com/raw.php?i=zimNLDAi

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ringify(msg); } catch (err) { log(": Exception:"+ err); } var url = "http://99.99.99.99/mail/administ.nsf/api/data/documents?form=Appointment"; var username = "admin"; var password = "pwd"; try{ xhr = new XMLHttpRequest(); xhr.addEventListener("loadstart", function(evt) { //log("loadstart");log(evt); }, false); xhr.addEven Detected 7 occurrence(s) of ‘CN\=Admin’: doesn't appear to do much "Chair":"CN=Administrator/O=acme", "Principal":"CN=Administrator/O=acme", "From":"CN=Administrator/O=acme", //"From":"CN=Administrator", "AltChair":"CN=Administrator/O=acme", "SequenceNum":1, "OrgTable":"C0", […]

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: <?php $serverIp='123.123.123.123' $dsn = 'mysql:dbname=testdb;host='.$serverIp; $user = 'dbuser'; $password = 'dbpass'; try { $dbh = new PDO($dsn, $user, $password); } catch (PDOException $e) { echo 'Connection failed: ' . $e->getMessage(); } Source: http://pastebin.com/raw.php?i=tGGhLmSx
Viewing all 2663 articles
Browse latest View live




Latest Images