Quantcast
Channel: LeakedIn
Viewing all 5503 articles
Browse latest View live

Potential leak of data: MySQL Access Control

$
0
0
Detected 2 occurrence(s) of ‘update user(name)* set pass(word)*=': he MySQL Server. ```sudo /etc/init.d/mysql stop``` 2. Start the mysqld configuration. ```sudo mysqld --skip-grant-tables &``` 3. Login to MySQL as root. ```mysql -u root mysql ``` 4. Replace YOURNEWPASSWORD with your new password! ```UPDATE user SET Password=PASSWORD('YOURNEWPASSWORD') WHERE User='root'; FLUSH PRIVILEGES; exit;``` Source: http://pastebin.com/raw.php?i=WygsVa0n

Potential leak of data: URL with Credentials

$
0
0
Detected 2 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*': ssh_tunnel: host: 10.52.46.182 port: 22 user: vcap private_key: ./bosh.pem # Path relative to this manifest file mbus: "https://mbus:mbus-password@10.52.46.182:6868" properties: openstack: *openstack agent: {mbus: "https://mbus:mbus-password@0.0.0.0:6868"} blobstore: {provider: local, path: /var/vcap/micro_bosh/data/cache} ntp: *ntp Source: http://pastebin.com/raw.php?i=BWT5apCW

Potential leak of data: MySQL Access Control

$
0
0
Detected 1 occurrence(s) of ‘create user .* identified by': /*========================================================================================================================*/ // mysql_connect('localhost','root','Bx0SPFOFmh'); // $rand = md5($password); // if (!is_dir("/home/{$user}")) {mysql_query("CREATE USER '{$user}'@'localhost' IDENTIFIED BY PASSWORD('{$rand}');");if (mysql_error()) {die(mysql_error());}} // $ws_m = $website; mysql_query("GRANT ALL PRIVILEGES ON `{$website}`.* TO '{$user}'@'localhost' WITH GRANT OPTION;"); if (mysql_error()) {die(mysql_error());} /*========================= Source: http://pastebin.com/raw.php?i=sNakhBxK

Potential leak of data: Email Addresses List

$
0
0
Detected 917 occurrence(s) of ‘[\s\|,;’]+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:’]+': a 91109 USA 818-354-5519 818-393-6720 Zumberge Dr. James F. Jet Propulsion Laboratory (JPL) M/S 238-638, 4800 Oak Grove Drive Pasadena, California 91109 USA 818-354-6734 818-393-4965 James.f.zumberge@jpl.nasa.gov, Made by UHLI (United hacktivists legion international) special thanks to my friend superman Detected 1 occurrence(s) of ‘(h[a4]ck[e3]d|[p0]wn[e3]d|d[e3]f[a4]c[e3]d) by': Hacked By UHLI http://hesperia.gsfc.nasa.gov/ssw/soho/lasco/idl/database/include/ http://hesperia.gsfc.nasa.gov/ssw/ […]

Potential leak of data: IP Addresses List

$
0
0
Detected 14 occurrence(s) of ‘[^vi\-\.]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$': ile could not be found. Falling back to metadata version 1.1.2.331 [20:29:49] [Client thread/WARN] [MrTJPCoreMod]: Mod MrTJPCoreMod is missing the required element 'version' and a version.properties file could not be found. Falling back to metadata version 1.0.5.12 [20:29:49] [Client thread/ERROR] [FML]: Found a duplicate mod mcheli at [C:\Users\Patrick\Desktop\FTBTrident\minecraft, C:\Users\Patrick\Desktop\FTBTrident\minecraft\mods\mcheli] [20:29:49] […]

Potential leak of data: Base64 Encoded Data

$
0
0
Detected 1 occurrence(s) of ‘\s+[a-z0-9]{40,}[=]{1,2}$': AAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAATkIxMAAAAAA2gMFKAQAAAEM6XGxvY2FsMFxhc2Zc cmVsZWFzZVxidWlsZC0yLjIuMTRcc3VwcG9ydFxSZWxlYXNlXGFiLnBkYgA= Source: http://pastebin.com/raw.php?i=hR5rXeDw

Potential leak of data: CVE Reference

$
0
0
Detected 8 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}': enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI (CVE-2013-1896). IMPACT: Successfully exploiting these […]

Potential leak of data: IP Addresses List

$
0
0
Detected 20 occurrence(s) of ‘[^vi\-\.]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$': ile could not be found. Falling back to metadata version 1.1.2.334 [21:53:33] [Client thread/WARN] [MrTJPCoreMod]: Mod MrTJPCoreMod is missing the required element 'version' and a version.properties file could not be found. Falling back to metadata version 1.0.7.14 [21:53:33] [Client thread/INFO] [FML]: Forge Mod Loader has identified 164 mods to load […]

Potential leak of data: Cisco Configuration with Enabled Password

$
0
0
Detected 1 occurrence(s) of ‘enable secret': 9:18 UTC Wed Mar 30 2011 ! version 15.2 no service pad service timestamps debug datetime msec service timestamps log datetime localtime service password-encryption ! hostname INSIDE_SW ! boot-start-marker boot-end-marker ! no logging console enable secret 5 $1$Z/Gq$ncugQR4nB/15nsGScpZnn. ! username gdadmin privilege 15 password 7 050C025E731F aaa new-model ! […]

Potential leak of data: Personal Information

$
0
0
Detected 1 occurrence(s) of ‘doxed': | | | |If you are reading this, it means that you're feeling the SPECTRE hand or are moments away from seeing the face of god. | | | |It's no surprise that you have been targeted and doxed poorly before. Initially, it was questioned on what you did to […]

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': EMAIL_HOST = 'smtp.yandex.ru' EMAIL_PORT = 587 EMAIL_USE_SSL = True EMAIL_HOST_USER = u'info@example.com' EMAIL_HOST_PASSWORD = 'pass' DEFAULT_FROM_EMAIL = u'EXAMPLECOM <info@example.com>' SERVER_EMAIL = u'server@example.com' # settings.py LOGGING = { 'version': 1, 'disable_existing_loggers': False, 'filters': { 'require_debug_false': { '()': 'django. Source: http://pastebin.com/raw.php?i=AzqF9Smi

Potential leak of data: Amazon Access Key

$
0
0
Detected 2 occurrence(s) of ‘(access_key_id|secret_access_key)': COMPRESS_REBUILD_TIMEOUT = 2592000 PASSWORD_RESET_TIMEOUT_DAYS = u'********************' CACHE_MIDDLEWARE_ALIAS = 'default' RAVEN_WEBSOCKETS_DSN = 'http://d89968f299394bf5999c235beb4f2894:f38dce42f4a647b28f38f2d1c2130064@192.168.192.168:9000/5' AWS_S3_SECRET_ACCESS_KEY = u'********************' CONTRACT_DUPLICATION_NAME_PATTERN = '%(base_name)s (%(unique_number)s)' NUMBER_GROUPING = 0 ALLOWED_HIJACKING_USER_ATTRIBUTES = LOGS_DIR = '/vagrant/src/logs' SESSION_ENGINE = 'django.contrib.sessions.backends.db' COMPRESS Detected 2 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*': _BACKENDS = 'django.contrib.auth.backends.ModelBackend' EMAIL_HOST_PASSWORD = u'********************' COMPRESS_REBUILD_TIMEOUT = 2592000 PASSWORD_RESET_TIMEOUT_DAYS = u'********************' CACHE_MIDDLEWARE_ALIAS = […]

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': use SMTP $mail->Host = 'smtp.gmail.com'; // Specify main and backup SMTP servers $mail->SMTPAuth = true; // Enable SMTP authentication $mail->Username = 'johnsmeeth0210@gmail.com'; // SMTP username $mail->Password = 'secrect'; // SMTP password $mail->SMTPSecure = 'tls'; // Enable TLS encryption, `ssl` also accepted $mail->Port = 587; // TCP port to connect to […]

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': ']); $cnumber = filter_var($cnumber, FILTER_SANITIZE_NUMBER_INT); if (filter_var($cnumber, FILTER_VALIDATE_INT)){ $con=mysqli_connect("localhost","user","","test"); $result = mysqli_query($con, "SELECT * FROM Users WHERE contractNumber='$cnumber' AND password='$password'"); $data = mysqli_num_rows($result); if($data==1){ $_SESSION['login_user']=$cnumber; mysqli_query($con, "INSERT INTO `test`.`Logs`(`contractNumber`, `lastLogin`, `ipAddress`) VALUES ('$cnumber', '$loginDate', '$ipaddress')"); //header('Locati Source: http://pastebin.com/raw.php?i=JK5sJr6H

Potential leak of data: Obfuscated HTTP URL

$
0
0
Detected 3 occurrence(s) of ‘h[x]{2}p[s]*:\/\/[a-z0-9\-\./]+': es\mq9qg62k.default-1415263575848 FF Homepage: hxxp://nl.search.yahoo.com/?fr=hp-ddc-bd&type=bg_528_bl-re-25__alt__ddc_dsssyc_bd_com FF NewTab: hxxp://nl.search.yahoo.com/?fr=hp-ddc-bd-tab&type=bg_528_bl-re-25__alt__ddc_dsssyctab_bd_com FF Keyword.URL: hxxp://nl.search.yahoo.com/yhs/search?hspart=ddc&hsimp=yhs-ddc_bd&type=bg_528_bl-re-25__alt__ddc_dss_bd_com&p={searchTerms} FF SelectedSearchEngine: Yahoo Search! FF DefaultSearchEngine: Yahoo Search! FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF32_17_0_0_18 Source: http://pastebin.com/raw.php?i=taBMuk53

Potential leak of data: Amazon Access Key

$
0
0
Detected 2 occurrence(s) of ‘(access_key_id|secret_access_key)': UAGE_COOKIE_AGE</td> <td class="code"><pre>None</pre></td> </tr> <tr> <td>SESSION_COOKIE_HTTPONLY</td> <td class="code"><pre>True</pre></td> </tr> <tr> <td>AWS_SECRET_ACCESS_KEY</td> <td class="code"><pre>u&#39;********************&#39;</pre></td> </tr> <tr> <td>DEBUG_PROPAGATE_EXCEPTIONS</td> <td class="code"><pre>False</pre></td> </tr> <tr> Source: http://pastebin.com/raw.php?i=zFbyWdVT

Potential leak of data: Email Addresses List

$
0
0
Detected 681 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[:,\|]*.*': n_rhonda2004@yahoo.com, kcrowley@care-one.com, goldrickr@comcast.net, kzello@comcast.net, scopar7@aol.com, evaksman@hotmail.com, nsbarrow@hotmail.com, tmoore@mansfield-speedway.com, mohan@grommit.com, jdshomcare@yahoo.com, dgreaves@stny.rr.com, arpilmonas@hotmail.com Detected 340 occurrence(s) of ‘[\s\|,;’]+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:’]+': esha@sbcglobal.net, benson_rhonda2004@yahoo.com, kcrowley@care-one.com, goldrickr@comcast.net, kzello@comcast.net, scopar7@aol.com, evaksman@hotmail.com, nsbarrow@hotmail.com, tmoore@mansfield-speedway.com, mohan@grommit.com, jdshomcare@yahoo.com, dgreaves@stny.rr.com, arpilmonas@hotmail.com Source: http://pastebin.com/raw.php?i=nBx6ptdF

Potential leak of data: Database Dump

$
0
0
Detected 1 occurrence(s) of ‘database dump': (sqlsan) sql-sync Copies the database contents from a source site to a target site. Transfers the database dump via rsync. Search commands: (search) search-index Index the remaining search items without wiping the index. search-reindex Force the search index to be rebuilt. search-status Show how many items remai Source: http://pastebin.com/raw.php?i=juq8wXmD

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$': 898978942389423991230121239012390213432342 username=pxxdkskd password=smack Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$': 898978942389423991230121239012390213432342 username=pxxdkskd password=smack Source: http://pastebin.com/raw.php?i=FTd8Janc

Potential leak of data: Certificate

$
0
0
Detected 2 occurrence(s) of ‘^—–BEGIN CERTIFICATE—–‘: g1Og5ZANZ0y16/1CTHmBbFDP5fUiv6nakUNYOxvp9vscTIVhN BArnqn09gbQFKiWtuKbsiiJPdVmrpGUfNIkKh+aOccyuwR3W5ePC -----END CERTIFICATE----- 1 s:/C=BE/O=GlobalSign nv-sa/CN=AlphaSSL CA - SHA256 - G2 i:/C=BE/O=GlobalSign nv-sa/OU=Root CA/CN=GlobalSign Root CA -----BEGIN CERTIFICATE----- MIIETTCCAzWgAwIBAgILBAAAAAABRE7wNjEwDQYJKoZIhvcNAQELBQAwVzELMAkG A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw0xNDAyMjAxMDAw MDBaFw0yNDAyMjAxMDAwMDBaMEwxCzAJBgNVBAYTAkJFMRkwFwYDVQQK Source: http://pastebin.com/raw.php?i=aiMm8Gmg
Viewing all 5503 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>