Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: MySQL Access Control

$
0
0
Detected 1 occurrence(s) of ‘create user .* identified by': mp-1417427857.29-47807875468945/mysql_user", line 466, in main changed = user_add(cursor, user, host, password, priv) File "/home/vagrant/.ansible/tmp/ansible-tmp-1417427857.29-47807875468945/mysql_user", line 164, in user_add cursor.execute("CREATE USER %s@%s IDENTIFIED BY %s", (user,host,password)) File "/usr/lib/python2.7/dist-packages/MySQLdb/cursors.py", line 174, in execute self.errorhandler(self, exc, value) File "/usr/lib/python2.7/dist-packages/MySQLdb/connections.py", line 36, in defaulterrorhandler Source: http://pastebin.com/raw.php?i=titvuhjQ

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>