Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ="ds1" driver="oracle.jdbc.driver.OracleDriver" url="jdbc:oracle:thin:@//oracle-1:1521/DB1" user="SCHEMA1" password="Passw0rd1"/> <dataSource name="ds2" driver="oracle.jdbc.driver.OracleDriver" url="jdbc:oracle:thin:@//oracle-1:1521/DB2" user="SCHEMA2" password="Passw0rd2"/> <document> <entity name="apples" dataSource="ds1" pk="id" query="select id,name,color from apples" /> </entity> <entity name="bannnas" dataSource="ds2" pk="id" query="select id,name,desc from bananas" /> </entity> Detected 2 occurrence(s) of ‘dbc:oracle:thin:’: <dataConfig> <dataSource name="ds1" driver="oracle.jdbc.driver.OracleDriver" url="jdbc:oracle:thin:@//oracle-1:1521/DB1" user="SCHEMA1" password="Passw0rd1"/> <dataSource name="ds2" driver="oracle.jdbc.driver.OracleDriver" url="jdbc:oracle:thin:@//oracle-1:1521/DB2" user="SCHEMA2" password="Passw0rd2"/> […]

Viewing all articles
Browse latest Browse all 2663

Trending Articles