Potential leak of data: Command Line Password
Detected 1 occurrence(s) of ‘\-\-[pP]assword\=[^%^\$]‘:
"$LIST" # find $CONFIG -depth -type f \( -ctime -1 -o -mtime -1 \) -print > $LIST tar cfzT "/root/backup/config/config_diff_$6-$2-$3.tgz" "$LIST" rm -f "$LIST" fi # # create sql dump of databases: mysqldump -u root --password=******* --opt mydb > "/root/backup/database/mydb_$6-$2-$3.sql" gzip "/root/backup/database/mydb_$6-$2-$3.sql" # #umount /mnt/backup # SEND MAIL uuencode /root/backup/data/data_full_$6-$2-$3.tgz /root/backup/data/data_full_$6-$2-$3.tgz > /root/backup/se
If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.
This entry was posted on Tuesday, June 12th, 2012 at 22:01 and is filed under PasteMon. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.
Comments are closed.
Thank you very much for your report. We will process it as soon as possible!