Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ile> <super-users>admin</super-users> <ghttp enabled="false"></ghttp> </status-web> </rmi> <user-manager class="com.bowman.cardserv.XmlUserManager" allow-on-failure="false" log-failures="true"> <auth-config> <user name="admin" password="xxxxxx" max-connections="3" admin="true"/> <user-source name="genxmloutput"> <user-file-url>http://127.0.0.1/cmum/genxml/genxml.php</user-file-url> </user-source> </auth-config> </user-manager> <connection-manager> <reconnect-interval>30</reconn Source: http://pastebin.com/raw.php?i=1srDKUeh

Viewing all articles
Browse latest Browse all 2663

Trending Articles