Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: rity:form-login login-page="/login.html" default-target-url="/user/welcome.html"/> </security:http> <security:authentication-manager> <security:authentication-provider> <security:user-service id="userDetailsService"> <security:user password="password" name="username" authorities="ROLE_USER" /> </security:user-service> </security:authentication-provider> </security:authentication-manager> <!--Annotated Controller (on by default) - for older style programming + JSON support --> <mvc: Source: http://pastebin.com/raw.php?i=PuPWMbhS

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>