LeakedIn Logo
Stories About Data Leaks and Related Stuff

Posts Tagged ‘URL with Credentials’

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

## curl

POST http://dawn:salvorhardin@anzejagodic.com:8001/v2/sessions HTTP/1.1
Authorization: Basic ZGF3bjpzYWx2b3JoYXJkaW4=
User-Agent: curl/7.33.0
Host: anzejagodic.com:8001
Accept: */*
Proxy-Connection: Keep-Alive
Content-Length: 19
Content-Type: application/x-www-form-urlencoded

{"channel_id": "5"}

##

Source: http://pastie.org/pastes/8554843/download

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

http://furkan:311@superturkiptv.hopto.org:5001

Source: http://pastebin.com/raw.php?i=rJzTi4k7

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

p.myserver.com
Searching for host...
Network error: Connection timed out.
	
ftp> open ftp.myserver.com
Connected to myserver.
220 Gene6 FTP Server v3.10.0
User (...): myuser
331 Password required for myuser
Password:
230 User manager logged in.
	
open ftp://myusername:mypassword@ftp.myserver.com -passive=on
	
put -transfer=ascii C:temptest.xml test.xml
	
option batch abort
option confirm off

Source: http://pastebin.com/raw.php?i=dAXBuGq7

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 4 occurrence(s) of ‘http[s]*:\/\/[a-z0-9\-\.]+\.[a-z]{2,3}\/.*[\?&]user(name)*=\w+&pass(word)*=\w+':

    //$msg1="Email Sent Successfully";
    header( "Location:$location" );
    header("location:formsubmit.html");

?>
	
http://smsad.smsapiindia.com/SendSms.aspx?username=xxx&password=xxx&to=$mobile&from=xxxx&message=Thank You for Contacting
	
$url="http://smsad.smsapiindia.com/SendSms.aspx?username=xxx&password=xxx&to=$mobile&from=xxxx&message=Thanks";
$curl = curl_init();
curl_setopt($curl, CURLOPT_URL, $url);
curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($curl, CURLOPT_FOLLOWLOCATION, 1);
$auth = curl_exec($curl);
if($auth)
{ 
if(mail("training@myweb.

Source: http://pastebin.com/raw.php?i=g5WuaecX

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.

Potential leak of data: URL with Credentials

0 votedvote

Detected 1 occurrence(s) of ‘[ht|f]tp[s]*:\/\/\w+\:.*\@\w*\.\w*':

<?php
//Script made by Smiba from doges.org - http://bartstuff.eu/doge/
//DO NOT REMOVE MADE BY! I'm trying to help here, so just leaving 1 line would be the minimum you could do for me
 require_once 'jsonRPCClient.php';
 $doge = new jsonRPCClient('http://dogecoinrpc:PASSWORD@127.0.0.1:22555/');
 print_r($doge->getbalance());
echo "</b> - Please donate: DCp9uf6AaZTf4SSTmKmAhJPv5QnoEZh6S5<br />";

$username = $_POST['address'];
$ip = $_SERVER['REMOTE_ADDR'];
if(!empty($_POST['address'])) {
        if($doge->getbalance() < 20){

Source: http://pastebin.com/raw.php?i=jyHHe9nb

If you find the content of this pastie suspicious or inappropriate, highlight the relevant piece of text and press Shift + E or click here to notify us.