Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: import MySQLdb con = MySQLdb.Connection(db='parking_report', host='localhost',user='root',passwd='pass') f = open('work.html', 'w') with con: cur: = con.cursor() cur.execute("SELECT * FROM report_table") rows = cur.fetchall() for row in rows: s = str(row) f.write(s) f.close() con.close() Source: http://pastebin.com/raw.php?i=FjGPtumB

Viewing all articles
Browse latest Browse all 2663

Trending Articles