Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: sword" userNameCol="name" userRoleTable="roles" userTable="users"/> </Realm> <Resource auth="Container" driverClassName="com.mysql.jdbc.Driver" maxActive="100" maxIdle="30" maxWait="10000" name="jdbc/proto" password="proto" type="javax.sql.DataSource" url="jdbc:mysql://localhost:3306/proto" username="proto"/> <resource-ref> <description>DB Connection</description> <res-ref-name>jdbc/proto</res-ref-name> <res-type>javax.sql.DataSource</res-type> Source: http://pastebin.com/raw.php?i=6EJfDRQx

Viewing all articles
Browse latest Browse all 2663

Trending Articles