The Blog of Ethical Hacker

New on the site

Walkthrough: Config Editor app in Android

April 3, 2024

Affected Product Config Editor Affected version 1.0 CVE ID N/A Vulnerability Type Remote Code Execution Type MOBILEAPPS DescriptionCVE-2022-1471 identifies a critical unsafe deserialization vulnerability within the SnakeYaml library for Java. This vulnerability arises from the Constructor class’s failure to adequately restrict the types of objects that can be deserialized. Consequently, attackers can craft malicious YAML […]

, ,

Sci-Fi Notes: The Dice: Afterlife

March 23, 2024

By Ramil Mustafayev The story takes place in a future where humans have established a colony on a new planet called Cygnus-X1. Society struggles with poverty, injustice and violence, and the rulers struggle to maintain order. A team of brilliant scientists and engineers called the Brainwave Pioneers, led by Dr. Ava Mitchell, develop a groundbreaking technology […]

CVE-2023-37152: Online Art gallery project 1.0 – Arbitrary File Upload (Unauthenticated)

June 16, 2023

Affected Product Online Art gallery project Affected version 1.0 CVE ID CVE-2023-37152 Vulnerability Type Arbitrary File Upload (Unauthenticated) Type WEBAPPS Description Online Art Gallery Project 1.0 allows unauthenticated users to perform arbitrary file uploads via the adminHome.php page. Due to the absence of an authentication mechanism and inadequate file validation, attackers can upload malicious files, […]

CVE-2023-36256: Online Examination System Project 1.0 – Cross-site request forgery (CSRF)

June 13, 2023

Affected Product Online Examination System Project Affected version 1.0 CVE ID CVE-2023-36256 Vulnerability Type Cross-site request forgery (CSRF) Type WEBAPPS Description The Online Examination System Project 1.0 version is vulnerable to Cross-Site Request Forgery (CSRF) attacks. An attacker can craft a malicious link that, when clicked by an admin user, will delete a user account […]

CVE-2020-29168: Online Doctor Appointment Booking System PHP and Mysql 1.0 – ‘q’ SQL Injection

November 29, 2020

An SQL injection vulnerability was discovered in PHP Doctor Appointment System by me on 11/16/2020. In ‘getuser.php’ file, GET parameter ‘q’ is vulnerable. The vulnerability could allow for the improper neutralization of special elements in SQL commands and may lead to the product being vulnerable to SQL injection. Output: Extracted database: qbqvqdb_healthcareqvbxq

Walkthrough: Legacy (HTB Retired Box)

April 12, 2019

Legacy is a retired machine at the beginner level that shows SMB’s possible security threats in Windows OS.

, , , ,

Walkthrough: Lame (HTB Retired Box)

December 5, 2018

Lame is a retired Linux machine that is rated as Easy on Hack the Box. There are many ways to get flags, but I will demonstrate one of the easiest ways.

, , , ,