Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': ntext antiJARLocking="true" path="/PathToWebService"> <Resource auth="Container" driverClassName="oracle.jdbc.driver.OracleDriver" maxActive="20" maxIdle="10" maxWait="-1" name="name" password="password" type="javax.sql.DataSource" url="jdbc:oracle:thin:@78.47.129.174:1521:XE" username="username"/> </Context> ******************* * PERSISTENCE.XML * ******************* <?xml version="1.0" encoding="UTF-8"? Detected 2 occurrence(s) of ‘dbc:oracle:thin:': nce.jpa.PersistenceProvider</provider> <jta-data-source>java:comp/env/jdbc/oracle</jta-data-source> ... classes ... <validation-mode>NONE</validation-mode> <properties> <property name="javax.persistence.jdbc.url" value="jdbc:oracle:thin:@xx.xx.xxx.xxx:1521:XE"/> <property name="javax.persistence.jdbc.user" value="username"/> <property name="javax.persistence.jdbc.password" value="password"/>--> <property name="javax.persistence.jdbc.driver" value="oracle.jdbc.OracleDr Source: http://pastebin.com/raw.php?i=ks9bQtpf

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>