LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘pastie.org’

Potential leak of data: Simple Password

0 votedvote

Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]’:

true"
						timeBetweenEvictionRunsMillis="10000"
						minEvictableIdleTimeMillis="300000"
						numTestsPerEvictionRun="100"
						testOnBorrow="false"
						testOnReturn="false"
						whenExhaustedAction="1"              
              		username="kiko" 
             		password="kiko" 
              		driverClassName="com.mysql.jdbc.Driver"
              		url="jdbc:mysql://localhost/kiko?useConfigs=maxPerformance&characterEncoding=utf8" />
        -->

		<!-- If you want to use a mail JNDI resource please set mail.fromJNDI propert

Source: http://pastie.org/pastes/9987785/download

Potential leak of data: API Key

0 votedvote

Detected 1 occurrence(s) of ‘(api|private)[-_]key[ “‘]*=[ =”‘]*\w+’:

octobat_api_request.rb

class OctobatAPIRequest
  class << self
    def perform(api_key)
      ap block_given?
      Octobat.api_key = api_key
      # yield
    end
    handle_asynchronously :perform
  end
end



invoices_controller.rb

def create
    if !params[:invoice][:customer_name].blank?
      params[:invoice].delete(:customer_name)
    end

    if !params[:invoice][:customer_id].blank?
 

Source: http://pastie.org/pastes/9987471/download

Potential leak of data: Email/Password Dump

1 votedvote

Detected 15 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[ \t;,:\|]+\S+’:

rpgm@gmail.com : bk3xwing

------------------------------
eniot1985@gmail.com : marilyn26

------------------------------
lucchartrand@bell.net : situation123

-----------------------------
Hendersone955@gmail.com : 1redeyes

-----------------------------
buvu11@yahoo.com : smells123

Source: http://pastie.org/pastes/9987315/download

Potential leak of data: IP Addresses List

0 votedvote

Detected 23 occurrence(s) of ‘[^vi\-\.]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$’:

 Version: 4.0.30319.34209 built by: FX452RTMGDR
CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_32/System.Transactions/v4.0_4.0.0.0__b77a5c561934e089/System.Transactions.dll
----------------------------------------
System.Security
Assembly Version: 4.0.0.0
Win32 Version: 4.0.30319.34209 built by: FX452RTMGDR
CodeBase: file:///C:/WINDOWS/Microsoft.Net/assembly/GAC_MSIL/System.Security/v4.0_4.0.0.0__b03f5f7f11d50a3a/System.Security.dll
----------------------------------------

************** JIT Debugging ***

Source: http://pastie.org/pastes/9987284/download

Potential leak of data: Simple Password

0 votedvote

Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]’:


class UserBehavior(TaskSet):
    def on_start(self):
        """ on_start is called when a Locust start before any task is scheduled """
        #self.url = ""
        #self.realm="SKF Insight Mobile (REST API)"
        #self.user = 'demo'
        #self.password = 'demo'
        #self.authhandler = urllib2.HTTPDigestAuthHandler()
        #self.authhandler.add_password(self.realm, self.url, self.user, self.password)
        #opener = urllib2.build_opener(self.authhandler)
        #urllib2.install_opener(opener)

    @task(

Source: http://pastie.org/pastes/9987115/download