Quantcast
Channel: pastebin.com – LeakedIn
Viewing all articles
Browse latest Browse all 2834

Potential leak of data: MySQL Access Control

$
0
0
Detected 2 occurrence(s) of ‘create user .* identified by’: CREATE USER 'fba_user'@'%' IDENTIFIED BY 'my_Pa$$word'; CREATE USER 'fba_user'@'localhost' IDENTIFIED BY 'my_Pa$$word'; FLUSH PRIVILEGES; GRANT ALL PRIVILEGES ON fallbackauthdb.* TO 'fba_user'@'%' IDENTIFIED BY 'my_Pa$$word' REQUIRE SSL; GRANT ALL PRIVILEGES ON fallbackauthdb.* TO 'fba_user'@'localhost' IDENTIFIED BY 'my_Pa$$word' REQUIRE SSL; Source: http://pastebin.com/raw.php?i=XR4UERUf

Viewing all articles
Browse latest Browse all 2834

Trending Articles