Quantcast
Channel: LeakedIn
Browsing all 5503 articles
Browse latest View live

Potential leak of data: Shellcode

Detected 66 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}’:...

View Article


Potential leak of data: Interesting HTTP Cookie

Detected 1 occurrence(s) of ‘^Set-Cookie: \S*(login|auth|pass|session|secret)\S*=\S+;’: HTTP/1.1 200 OK Date: Tue, 18 Jun 2013 11:17:14 GMT Server: Apache X-Powered-By: PHP/5.4.4 Etag:...

View Article


Potential leak of data: Simple Password

Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: l_escape_string($_POST['username']); $password=mysql_real_escape_string($_POST['password']); $passWord=md5($password); //...

View Article

Potential leak of data: MySQL Connect Information

Detected 1 occurrence(s) of ‘mysql_[p]*connect\(["']{0,1}[a-z0-9\-\.]+["']{0,1}\s*,’: $connect = mysql_connect("host","user","pass"); mysql_select_db("database",$connect); //select the table if...

View Article

Potential leak of data: Command Line Password

Detected 1 occurrence(s) of ‘\-\-[pP]assword\=[^%^\$]‘: /usr/local/nagios/libexec/check_oracle_health --environment ORACLE_HOME=/usr/lib/oracle/12.1/client64 --environment...

View Article


Potential leak of data: URL with Credentials

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*’: <form action="response.php" method="get" name="titles"> <p><input id="titles" onclick="this.select()" type="text"...

View Article

Potential leak of data: Simple Password

Detected 2 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: } } allprojects { apply plugin: 'idea' apply plugin: 'android' apply plugin: 'artifactory' } repositories { maven { url...

View Article

Potential leak of data: Simple Password

Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: #!/usr/bin/env python import requests import hashlib from threading import Thread from time import time,sleep...

View Article


Potential leak of data: Default Credentials

Detected 3 occurrence(s) of ‘default\s*credentials’: in the following HTTP responses: HTTP/1.1 200 Connection Established Connection: close UPDATE 4: I changed my IoC registration code to be this: var...

View Article


Potential leak of data: Email Addresses List

Detected 330 occurrence(s) of ‘[\s\|,;']+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:']+’: Other Technical Director hfloyd jr@nsa.gov herbert.floyd jr@nsa.gov Pasadena MD Raymond Kelso Other...

View Article

Potential leak of data: PHP Filesystem Interaction

Detected 2 occurrence(s) of ‘(fopen|file)\(.*\$(GET|POST)’: image']['name']; $image_tmp = $_FILES['image']['tmp_name']; if($post_title=='' or $post_keywords=='' or $post_content=='' or...

View Article

Potential leak of data: Default Security Password

Detected 1 occurrence(s) of ‘default (pass|passwd|password|secret)’: r of a drive // Set as false or for turn off. $hexdump_lines = 8; // lines in hex preview file $hexdump_rows = 24; // 16, 24 or 32...

View Article

Potential leak of data: Default Credentials

Detected 1 occurrence(s) of ‘default\s*credentials’: yReader(fStream); byte[] bytes = br.ReadBytes((int)numBytes); HttpWebRequest request = (HttpWebRequest)WebRequest.Create(url); request.ContentType =...

View Article


Potential leak of data: Email Addresses List

Detected 1524 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[:,\|]*.*’: r0932@gmail.com yurakuan.biz@gmail.com yuriayuuiti@gmail.com yuriel@jewel.ocn.ne.jp yusuke@jbking.org...

View Article

Potential leak of data: Shellcode

Detected 5 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}’: al(name, content); }...

View Article


Potential leak of data: Shellcode

Detected 218 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}’:...

View Article

Potential leak of data: Obfuscated JavaScript Code

Detected 1 occurrence(s) of ‘javascript.*eval\(‘: (k[0]&&typeof (r=k.length)=="number")for(i=0;i<r;i++)bn(k[i]);else...

View Article


Potential leak of data: MySQL Access Control

Detected 2 occurrence(s) of ‘using password’: ction(*args, **kwargs) File "/opt/zenoss/lib/python/MySQLdb/connections.py", line 187, in __init__ super(Connection, self).__init__(*args, **kwargs2)...

View Article

Potential leak of data: Shellcode

Detected 745 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}’:...

View Article

Potential leak of data: Shellcode

Detected 1 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}’:...

View Article
Browsing all 5503 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>