Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$’: er module=regexfilter match=[Ff][Oo0][rR][mM] replace=FROM [Regex Service] type=service router=readwritesplit max_slave_connections=75% router_options=slave_selection_criteria=LEAST_ROUTER_CONNECTIONS servers=server1,server2,server3,server4 user=maxuser passwd=maxpwd filters=regex [Regex listener] type=listener service=Regex Service protocol=MySQLClient port=4004 Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$’: er module=regexfilter match=[Ff][Oo0][rR][mM] replace=FROM [Regex Service] type=service router=readwritesplit max_slave_connections=75% router_options=slave_selection_criteria=LEAST_ROUTER_CONNECTIONS servers=server1,server2,server3,server4 user=maxuser passwd=maxpwd filters=regex [Regex listener] type=listener service=Regex Service protocol=MySQLClient port=4004 Source: http://pastie.org/pastes/9261810/download

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>