Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: /537.36 (KHTML, like Gecko) Chrome/31.0.1650.63 Safari/537.36 Request Payloadview source {organization:apigee12, username:test1, name:test, email:rippela+12@apigee.com, password:testtest} email: "rippela+12@apigee.com" name: "test" organization: "apigee12" password: "testtest" username: "test1" Response Headersview source Access-Control-Allow-Credentials:true Access-Control-Allow-Origin:http://ec2-54-214-216-145.us-west-2.compute.amazonaws.com:9000 Connection:keep-alive Content-Type:application/json Date:Thu, 23 Jan 2014 22:27: Source: http://pastie.org/pastes/8661885/download

Viewing all articles
Browse latest Browse all 2663

Trending Articles