Because there are people like me who "scan networks" themselves to sleep counting specimens. I'm looking at you, petrochemical company with open video conference system a few miles away, and you battery powered terrain shift monitoring sensor at old oil rig that became a 300 meters wide hole, visible from space, and you, TV station with such the helpful admin that he exposed a page titled "intranet" to help the not so tech savvy journalists access FTP, with the credentials on the page of course, and tomorrow's news prompts and contents with write permissions, or you, radio with firewalls still on default config (may the soul of Heaviside haunt your waves), or you, Telco employee with meticulously noted credentials on a sheet of paper for such banal infrastructure, or you, law enforcement officer leaving a flash drive with secret technical specs on a new system in an internet cafe because you needed something to store "onanism inducing material".<p>- Default config.<p>- But the machine isn't a website, it doesn't have a name, just an IP address. Who would find it?<p>- Just execute user SQL query / eval user code, what could possibly go wrong? I'm sure all the docs telling you no string substitution, not even with a gun on your head, is just exaggeration..<p>- Password is domain name.<p>- Password comparison in JavaScript, rendered, readable (a special place in hell for this one).<p>- And of course, clear text passwords. Gotta love that one.