Some applications and packages have testing information that could provide access to a malicious user if it is active. For example, a common case is Oracle DBMS, which has a database with tables for testing purposes with a database administrator called tiger, for which the password is scott.