Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: "$username", "$password")or die("cannot connect"); mysql_select_db("$db_name")or die("cannot select DB"); $pass = mysql_escape_string($_POST['pass']); $usr = mysql_escape_string($_POST['usr']); $sql = mysql_query("SELECT * FROM USERS WHERE Usr='$usr' and Password='$pass'"); $count=mysql_num_rows($sql); // If result matched $myusername and $mypassword, table row must be 1 row if($count==1){ header("location:index.php"); } else { } Source: http://pastebin.com/raw.php?i=eUxEBzi1
↧
Potential leak of data: Simple Password
↧
Potential leak of data: Simple Password
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: com.knesek.ampq.spring.MessageReceiver" /> </beans> <beans:beans xmlns:beans="http://www.springframework.org/schema/beans" xmlns="http://www.springframework.org/schema/rabbit" ...> <connection-factory id="connectionFactory" username="guest" password="guest" host="127.0.0.1"/> <template id="amqpTemplate" connection-factory="connectionFactory"/> <admin connection-factory="connectionFactory" /> <direct-exchange name="incomingMessages"> <bindings> <binding key="messages.inbound" q Source: http://pastebin.com/raw.php?i=XcZbQKDm
↧
↧
Potential leak of data: Shellcode
Detected 1 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}’: int InicializarD3D(void) { DWORD D3DBase, ResultadoD3DBase, *vTable; D3DBase=0;do { D3DBase = (DWORD)GetModuleHandle("d3d9.dll"); Sleep(10); } while(!D3DBase); ResultadoD3DBase = ProcurePattern(D3DBase, 0x128000, (PBYTE)"\xC7\x06\x00\x00\x00\x00\x89\x86\x00\x00\x00\x00\x89\x86", "xx????xx????xx"); if (ResultadoD3DBase) { memcpy(&vTable,(void *)(ResultadoD3DBase+2),4); pBeginScene = (BeginScene_)DetourFunction((PBYTE)vTable[42],(PBYTE)nBeginScene); pReset = (Reset_t)DetourFunction((PBYTE)vTable[16] Source: http://pastebin.com/raw.php?i=dA3abKFf
↧
Potential leak of data: Email Addresses List
Detected 9830 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[:,\|]*.*’: dyk@shaw.ca zygocaste@shaw.ca zyijiang@shaw.ca zylukd@shaw.ca zynyx@shaw.ca zyta@shaw.ca zzalis@shaw.ca zzbrown@shaw.ca zzeinaly@shaw.ca zzhang50@shaw.ca zzhao@shaw.ca zzhong@shaw.ca zzjamie.linda@shaw.ca zzlotnik@shaw.ca zzubchenko@shaw.ca zzzmax1@shaw.ca Detected 4914 occurrence(s) of ‘[\s\|,;']+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:']+’: haw.ca zxu@shaw.ca zyang15@shaw.ca zydyk@shaw.ca zygocaste@shaw.ca zyijiang@shaw.ca zylukd@shaw.ca zynyx@shaw.ca zyta@shaw.ca zzalis@shaw.ca zzbrown@shaw.ca zzeinaly@shaw.ca zzhang50@shaw.ca zzhao@shaw.ca zzhong@shaw.ca zzjamie.linda@shaw.ca zzlotnik@shaw.ca zzubchenko@shaw.ca zzzmax1@shaw.ca Source: http://pastebin.com/raw.php?i=AbQnbmQU
↧
Potential leak of data: Personal Information
Detected 1 occurrence(s) of ‘doxed’: ============================================ Ime : Bojan Prezime : Rajic Nick : Ryan Drzava : Bosnia and Gerzegovina Grad : Banja Luka Ulica : Pavle Radena 9 Postanski Broj : 75290 Internet Servis Provider :Telekom Srpske IP :109.165.158.80 Doxed by Talan ================================================= Other : Ovo ti je za stranice ;) Source: http://pastebin.com/raw.php?i=wFJBnnP1
↧
↧
Potential leak of data: Hacking Notification
Detected 2 occurrence(s) of ‘(h[a4]ck[e3]d|[p0]wn[e3]d|d[e3]f[a4]c[e3]d) by’: ipt> <style><head> <style><head><style><head><style><head><style><head><style><head><style><head><style><head><style><head><style><head><style></style> <title>hacked by Xenon??? </title><style type="text/css">body {background: #310404 url(http://pandodaily.files.wordpress.com/2013/11/anonymous.jpg) no-repeat top;background-color:black;cursor: url(https://dl.dropboxusercontent.com/u/51626059/psycho.cur), progress;}.pc-con Source: http://pastebin.com/raw.php?i=HCd4N12S
↧
Potential leak of data: Interesting Online File
Detected 1 occurrence(s) of ‘http[s]*:\/\/[a-z0-9\-\./]+\.(doc|ppt|xls|mdb|conf|cfg|vmdk|rtf)\s’: putlocker.com/file/85F2D13C6B0D65F7 lena-nitro-exklusiverr-arschfick.avi.zip http://www.putlocker.com/file/FAAE063791A5BB4D PRINCIPLES OF DIALYSIS.ppt http://www.mediafire.com/file/amzmmylozrk/PRINCIPLES OF DIALYSIS.ppt LongtermCofdialysis.ppt http://www.mediafire.com/file/wn5zldl1ddj/LongtermCofdialysis.ppt Dialysis Adequacy.ppt http://www.mediafire.com/file/w0yynwqn2nf/Dialysis Adequacy.ppt SURGERY IN DIALYSIS PATIENTS.ppt http://www.mediafire.com/file/vmoutxjj2z4/SURGERY IN DIALYSIS PATIENTS.ppt Autopsy.Life.and.Death.rar http://uploading.com/fi Source: http://pastebin.com/raw.php?i=2ehBHBpJ
↧
Potential leak of data: IP Addresses List
Detected 15 occurrence(s) of ‘[^vi\-\.]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$’: ies file could not be found. Falling back to metadata version 1.0.0.250 2014-07-06 21:08:19 [WARNING] [McMultipart] Mod McMultipart is missing the required element 'version' and a version.properties file could not be found. Falling back to metadata version 1.0.0.250 2014-07-06 21:08:19 [INFO] [ForgeModLoader] Forge Mod Loader has identified 184 mods to […]
↧
Potential leak of data: Email Addresses List
Detected 169 occurrence(s) of ‘[\s\|,;']+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:']+’: ure.newegg.com/NewMyAccount/AccountLogin.aspx Chrome everlostpoet@gmail.com Taco2eat https://login1.capitalone.com/loginweb/login/login.do Chrome JosephABland Taco2eat. https://applynow.sccsc.edu/Datatel.ERecruiting.Web.External/Pages/welcome.aspx Chrome everlostpoet@gmail.com taco2eat https://sccportal.sccsc.edu/ Chrome jabland 997802 Source: http://pastebin.com/raw.php?i=5qC6CBsp
↧
↧
Potential leak of data: Email Addresses List
Detected 25 occurrence(s) of ‘[\s\|,;']+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:']+’: Eye w/ Greg Gutfeld redeye@foxnews.com Special Report w/ Bret Baier special@foxnews.com Studio B w/ Shepard Smith studiob@foxnews.com The O'Reilly Factor oreilly@foxnews.com War Stories w/ Oliver North warstories@foxnews.com Your World w/ Neil Cavuto cavuto@foxnews.com SPREAD THE WORD! Source: http://pastebin.com/raw.php?i=P4X8bX6M
↧
Potential leak of data: CVE Reference
Detected 2 occurrence(s) of ‘CVE\-20[0-1]{1}[0-9]{1}\-[0-9]{4}’: ns.eq("refid", "CVE-2013-1950")); List<CveReference> refs = criteria.list(); Session session = HibernateUtil.getSession(); Criteria criteria = session.createCriteria(CveReference.class) .createAlias("id", "ref") .add(Restrictions.eq("ref.id", "CVE-2013-1950")); List<CveReference> refs = criteria.list(); Source: http://pastebin.com/raw.php?i=FzwGsQV6
↧
Potential leak of data: Simple Password
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ColumnName: username mySQLTablename: authme mySQLUsername: authme backend: file mySQLColumnLastLogin: lastlogin mySQLDatabase: authme mySQLPort: '3306' mySQLColumnIp: ip mySQLHost: 127.0.0.1 mySQLColumnPassword: password mySQLPassword: '12345' caching: true mySQLlastlocX: x mySQLlastlocY: y mySQLlastlocZ: z mySQLlastlocWorld: world mySQLColumnEmail: email mySQLColumnId: id mySQLColumnLogged: isLogged GroupOptions: UnregisteredPlayerGroup: '' RegisteredPlayerGroup: Source: http://pastebin.com/raw.php?i=gRckTJpm
↧
Potential leak of data: Email Addresses List
Detected 119 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[:,\|]*.*’: ail.com wbcuqa@gmail.com jscukznm@gmail.com ukgkkvcy@gmail.com fcfedzybuq@gmail.com pwhinh@gmail.com variedvhga@gmail.com weqymnlilpr@gmail.com hrkjkqxd@gmail.com tytspktozz@gmail.com jcbjcvr@gmail.com vczdbfzbcai@gmail.com xoyrbxjv@gmail.com sunglassessaleioioccymmkb@hotmail.com Detected 59 occurrence(s) of ‘[\s\|,;']+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:']+’: il.com wtiudectlca@gmail.com wbcuqa@gmail.com jscukznm@gmail.com ukgkkvcy@gmail.com fcfedzybuq@gmail.com pwhinh@gmail.com variedvhga@gmail.com weqymnlilpr@gmail.com hrkjkqxd@gmail.com tytspktozz@gmail.com jcbjcvr@gmail.com vczdbfzbcai@gmail.com xoyrbxjv@gmail.com sunglassessaleioioccymmkb@hotmail.com Source: http://pastebin.com/raw.php?i=3VsY0eit
↧
↧
Potential leak of data: MySQL URI
Detected 1 occurrence(s) of ‘mysql:\/\/’: uario, String senha){ try{ Class.forName("com.mysql.jdbc.Driver").newInstance(); }catch(Exception erro){ Log.e("MYSQL","Erro: "+erro); } try{ conn=DriverManager.getConnection("jdbc:mysql://"+host+":"+porta+"/"+banco,usuario,senha); Log.i("MYSQL","Conectado."); }catch(Exception erro){ Log.e("MYSQL","Erro: "+erro); } } public void desconectarMySQL(){ try { conn.close Source: http://pastebin.com/raw.php?i=tB6qypBk
↧
Potential leak of data: Cisco Configuration with Enabled Password
Detected 1 occurrence(s) of ‘enable secret’: how run Building configuration... Current configuration : 1930 bytes ! version 12.4 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname S2 ! boot-start-marker boot-end-marker ! enable secret 5 $1$c3Wo$JS01DpB3ePidG3ZN3VRxP/ ! no aaa new-model memory-size iomem 5 no ip routing no ip icmp rate-limit […]
↧
Potential leak of data: Exploit
Detected 2 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’: def bg_magenta; "\033[45m#{self}\033[0m" end def bg_cyan; "\033[46m#{self}\033[0m" end def bg_gray; "\033[47m#{self}\033[0m" end end def home() text=[ "[*]=========================================[*]", "[*] Auto Sql Injection Exploit V 1.0[*]", "[*] H A M Z A K I L L E R[*]", "[*] Hlyzidi[at]gmail[dot]com[*]", "[*]=========================================[*]" ] for oo in text puts oo.red sleep(0.1) end end […]
↧
Potential leak of data: VISA Credit Card
Detected 7 occurrence(s) of ‘[ \t:="']+4[0-9]{12}(?:[0-9]{3})?’: 2047000 l 02;48;39 PIN 9832 DEMO TRACK 1/2 + PIN US : Track2: 4852450003907464=10050114065434000000 PIN 5845 Track2: 4185506003290033=11144281300469401011 PIN 6846 ********** Track1: B4867967032437166^AVALLONE/SONJA^13011010000000472000000 Track2: 4867967032437166=13011010000047200000 | United States | JPMorgan Chase Bank N.A. - | Visa | PLATINUM | 101 | TR1+TR2 | PIN CODE : 2269 ******************************* [PAYPAL […]
↧
↧
Potential leak of data: Simple Password
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*["'][a-z0-9\-_\!\$]+["']‘: ): continue break Netmask='255.255.255.0' #CONFIGURE SSID, PASSWORD, ETC. SSID=raw_input('Enter SSID [joe_ssid] :') if SSID=='': SSID='joe_ssid' password=raw_input('Enter 10 digit password [1234567890] :') if password=='': password='1234567890' f = open('run.dat','r') lout=[] for line in f.readlines(): lout.append(line.replace('<SSID>',SSID).replace('<PASS>',password)) f.close() f = open('run.conf','w') f.writelines(lout) f.close() print 'created hostap Source: http://pastebin.com/raw.php?i=s3beWi7E
↧
Potential leak of data: DinersClub Credit Card
Detected 3 occurrence(s) of ‘[ \t:="']+3(?:0[0-5]|[68][0-9])[0-9]{11}’: eens:\n \nhttp://www.imglooks.com/viewer.php?file=87099855030185126570.jpg\n \nhttp://www.imglooks.com/viewer.php?file=41904841627617931453.jpg\n \nhttp://www.imglooks.com/viewer.php?file=39702632768604605440.jpg\n \nhttp://www.imglooks.com/viewer.php?file=38832387290393695900.jpg\t\t\n\t", "url": "magnet:?xt=urn:btih:0b2140039305c6cd30798c4f3f9693cbd5178512&dn=X-Men+Days+of+Future+Past+2014+720p+HDTS+x264+AC3+TiTAN2&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A80&tr=udp%3A%2F%2Ftracker.publicbt.com%3A80&tr=udp%3A%2F%2Ftra Source: http://pastebin.com/raw.php?i=BHb8AvKZ
↧
Potential leak of data: IP Addresses List
Detected 12 occurrence(s) of ‘[^vi\-\.]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$’: ies file could not be found. Falling back to metadata version 1.0.0.250 2014-07-07 19:08:55 [WARNING] [McMultipart] Mod McMultipart is missing the required element 'version' and a version.properties file could not be found. Falling back to metadata version 1.0.0.250 2014-07-07 19:08:55 [INFO] [ForgeModLoader] Forge Mod Loader has identified 146 mods to […]
↧