Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: @ManagedBean(name = "userDAO") @SessionScoped public class UserDAO { private static final String USERNAME = "something"; private static final String PASSWORD = "something"; private static final String CONN_STRING = "jdbc:sqlserver://petunia.arvixe.com.....something"; public List<Report> getUserList() { List<Report> list = new ArrayList<Report>(); PreparedStatement ps = null; Conn Source: http://pastebin.com/raw.php?i=wichJzgr

Viewing all articles
Browse latest Browse all 2663

Trending Articles