Posted by Andrey Stoykov on Aug 04
# Exploit Title: Blind SQL Injection – dolphinv7.4.2.
# Date: 8/2024
# Exploit Author: Andrey Stoykov
# Version: 7.4.2
# Tested on: Ubuntu 22.04
# Blog:
https://msecureltd.blogspot.com/2024/07/friday-fun-pentest-series-8-dolphinv742.html
SQL Injection:
Steps to Reproduce:
1. Navigate to “Builders” menu
2. The HTTP GET parameter of “?cat=builders” is displayed in the URL bar
3. That is the injection point
sqlmap -r…
More Stories
corosync-3.1.9-2.fc40
FEDORA-2025-0bafd025de Packages in this update: corosync-3.1.9-2.fc40 Update description: Security fix for CVE-2025-30472 Read More
varnish-7.5.0-3.fc41
FEDORA-2025-4453f596a8 Packages in this update: varnish-7.5.0-3.fc41 Update description: Security: This update includes fix for VSV00015 aka CVE-2025-30346. Upstream considers this...
corosync-3.1.9-2.fc41
FEDORA-2025-c55f39aeb3 Packages in this update: corosync-3.1.9-2.fc41 Update description: Security fix for CVE-2025-30472 Read More
corosync-3.1.9-3.fc42
FEDORA-2025-a350309ddb Packages in this update: corosync-3.1.9-3.fc42 Update description: Security fix for CVE-2025-30472 Read More
USN-7372-1: Varnish vulnerability
Martin van Kervel Smedshammer discovered that Varnish did not properly sanitize certain HTTP headers. A remote attacker could possibly use...
GitHub Actions Supply Chain Attack
What is the Attack?Recently, a popular third-party GitHub Action tj-actions/changed-files GitHub Action (CVE-2025-30066)- used by over 23,000 repositories- was compromised,...