Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 4 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ip-address="139.82.24.238" port="9000" database="contextnet" url-prefix="jdbc:postgresql://" jdbc-driver="org.postgresql.Driver"/> <connection name="dbLocal-mySql" enabled="true" auto-commit="true" username="lac" password="L4C123!" ip-address="192.168.2.142" port="3306" database="contextnet" url-prefix="jdbc:mysql://" jdbc-driver="com.mysql.jdbc.Driver"/> </connections> <dml-queries> <dml connection="dbLocal-mySql" stream= Detected 2 occurrence(s) of ‘mysql:\/\/’: river="org.postgresql.Driver"/> <connection name="dbLocal-mySql" enabled="true" auto-commit="true" username="lac" password="L4C123!" ip-address="192.168.2.142" port="3306" database="contextnet" url-prefix="jdbc:mysql://" jdbc-driver="com.mysql.jdbc.Driver"/> </connections> <dml-queries> <dml connection="dbLocal-mySql" stream="EventIrregularLocationReportReception" name="InsertToDBEventIrregularLUReception" executor-name="insertD Source: http://pastebin.com/raw.php?i=NHRsrrjW

Viewing all articles
Browse latest Browse all 2663

Trending Articles