Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: <jdbc-ee:mssql-data-source name="sqlServerDataSource" user="yyy" password="xxx" url="jdbc:sqlserver://xxxyyy.com;databaseName=testDB" transactionIsolation="UNSPECIFIED" doc:name="MS SQL Data Source"/> . . . <scripting:component doc:name="Groovy"> <scripting:script engine="Groovy"><![CDATA[ objectX = muleConte Source: http://pastebin.com/raw.php?i=kqShYutL

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>