Quantcast
Channel: LeakedIn
Viewing all articles
Browse latest Browse all 5503

Potential leak of data: Simple Password

$
0
0
Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': s=Sprint.objects.get(pk=1) self.assertIsNotNone(s) self.assertRedirects(response, '/sprint/1/') def test_to_edit_sprint(self): c = self.client self.assertTrue(c.login(username='temp', password='temp')) p= Proyecto.objects.first() self.assertIsNotNone(p) us=UserStory.objects.first() self.assertIsNotNone(us) u=User.objects.first() self.assertIsNotNone(u) f=Flujo.o Source: http://pastebin.com/raw.php?i=AckRLhHP

Viewing all articles
Browse latest Browse all 5503

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>