LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘HTTP POST’

Potential leak of data: HTTP POST

0 votedvote

Detected 6 occurrence(s) of ‘POST /.* HTTP\/1\.’:

.61.8 - - [08/Jun/2012:01:38:46 +0000] "POST /a/li?r=d404b75d985c2e54f05ee106e6438a8b HTTP/1.1" 404 145 "http://irc.stardustfields.net:9090/" "null"
2012-06-07 18:51:28-0700 [TimeoutHTTPChannel,129,50.90.61.8] 50.90.61.8 - - [08/Jun/2012:01:51:27 +0000] "POST /a/li?r=ae77b055064d2931e03532e34acddabf HTTP/1.1" 404 145 "http://irc.stardustfields.net:9090/#" "null"
2012-06-07 18:52:33-0700 [TimeoutHTTPChannel,131,50.90.61.8] 50.90.61.8 - - [08/Jun/2012:01:52:33 +0000] "GET / HTTP/1.1" 304 - "-" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; B

Source: http://pastebin.com/raw.php?i=GjwUm4r9

Potential leak of data: HTTP POST

1 votedvote

Detected 1 occurrence(s) of ‘POST /.* HTTP\/1\.’:

POST /bitrix/components/bitrix/iblock.vote/component.php HTTP/1.1..Host: ng58.ru..Connection: keep-alive..Content-Length: 173..Origin: http://ng58.ru..User-Agent: Mozilla/5.0 (X11; Linux x86_64) Appl
  eWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.151 Safari/535.19..Content-Type: application/x-www-form-urlencode

Source: http://pastebin.com/raw.php?i=0t202pU9

Potential leak of data: HTTP POST

0 votedvote

Detected 1 occurrence(s) of ‘POST /.* HTTP\/1\.’:

stream}n/%{instream}n (%{ratio}n%%) "%r"' deflate
CustomLog /var/log/httpd/deflate.log deflate
	
ip domain -/- (-%) "GET /wp-content/uploads/2010/03/favicon.ico HTTP/1.1"
ip domain 10995/52406 (20%) "GET /2006/07/19/ HTTP/1.0"
ip domain 1873/7891 (23%) "POST /registration/regForm HTTP/1.1"

Source: http://pastebin.com/raw.php?i=F3KdrL67

Potential leak of data: HTTP POST

1 votedvote

Detected 1 occurrence(s) of ‘POST /.* HTTP\/1\.’:

8:30 +0200] "GET / HTTP/1.1" 200 1593 "http://static.ak.facebook.com/platform/page_proxy.php?v=4" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.2 (KHTML, like Gecko) Chrome/15.0.865.0 Safari/535.2"
	
172.16.109.9 - - [01/Sep/2011:15:52:59 +0200] "POST /tab HTTP/1.1" 200 1314 "_https://s-static.ak.facebook.com/platform/page_proxy.php?v=4" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:6.0.1) Gecko/20100101 Firefox/6.0.1"

Source: http://pastebin.com/raw.php?i=1J9bem1F

Potential leak of data: HTTP POST

0 votedvote

Detected 2 occurrence(s) of ‘POST /.* HTTP\/1\.’:

Params(param); 

HttpResponse response = httpclient.execute(targetHost, login, client_context);
...
...
	
1  [org.apache.http.impl.conn.DefaultClientConnection] Sending request: POST /web/j_spring_security_check HTTP/1.1 
2  [org.apache.http.headers] >> POST /web/j_spring_security_check HTTP/1.1 
3  [org.apache.http.headers] >> Content-Length: 0 
4  [org.apache.http.headers] >> Host: localhost:8080 
5  [org.apache.http.headers] >> Connection: Keep-Alive 
6  [org.apache.http.headers] >> User-Agent: Apache-HttpClient/4.1.2 (java 1.5) 
7  [org.apac

Source: http://pastebin.com/raw.php?i=npLmuHdM