<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CyberDucky | My CyberVerse</title>
    <description>A location where I&apos;ll go through anything related to Cyber Security!</description>
    <link>/</link>
    <atom:link href="/feed.xml" rel="self" type="application/rss+xml"/>
    <pubDate>Mon, 16 Feb 2026 16:52:08 +0000</pubDate>
    <lastBuildDate>Mon, 16 Feb 2026 16:52:08 +0000</lastBuildDate>
    <generator>Jekyll v3.10.0</generator>
    
      <item>
        <title>Finding a Heap Buffer Over-Read in ascii-view (CWE-125)</title>
        <description>&lt;p&gt;Security research isn’t always about flashy exploits or instant remote code execution. Sometimes, the most valuable work is finding small, quiet bugs &lt;em&gt;before&lt;/em&gt; they become serious problems.&lt;/p&gt; &lt;p&gt;While reviewing the open-source project &lt;strong&gt;ascii-view&lt;/strong&gt;, I identified a &lt;strong&gt;heap buffer over-read vulnerability (CWE-125)&lt;/strong&gt; affecting the image grayscale conversion logic. Although the issue is not practically exploitable today, it represents a real memory safety flaw that could become exploitable if future changes alter how the leaked data is processed.&lt;/p&gt; &lt;p&gt;This article documents the vulnerability, explains why it happens, demonstrates how it can be reproduced, and shows how it was fixed following responsible disclosure...</description>
        <pubDate>Mon, 16 Feb 2026 08:41:45 +0000</pubDate>
        <link>/finding-a-heap-buffer-over-read-in-ascii-view-cwe-125/</link>
        <guid isPermaLink="true">/finding-a-heap-buffer-over-read-in-ascii-view-cwe-125/</guid>
        
        <category>security</category>
        
        <category>research</category>
        
        <category>bufferoverflow</category>
        
        <category>heap</category>
        
        <category>hacking</category>
        
        <category>oss</category>
        
        <category>c</category>
        
        <category>heap-overread</category>
        
        <category>research</category>
      </item>
    
      <item>
        <title>Critical SQL Injection Vulnerability Discovered in HortusFox (pending CVE-2025-65298)</title>
        <description>&lt;h2 id=&quot;overview&quot;&gt;Overview&lt;/h2&gt; &lt;p&gt;During a security assessment of &lt;strong&gt;HortusFox&lt;/strong&gt;, I identified a &lt;strong&gt;critical SQL injection vulnerability&lt;/strong&gt; that allows any authenticated user to execute arbitrary SQL queries against the application’s database. This flaw enables attackers to extract sensitive data, modify or delete records, escalate privileges, and potentially take full control of the application.&lt;/p&gt; &lt;p&gt;The vulnerability has been &lt;strong&gt;confirmed as exploitable&lt;/strong&gt;, and a &lt;strong&gt;tested patch&lt;/strong&gt; has been provided to the maintainers to enable rapid remediation. Pending: CVE-2025-65298.&lt;/p&gt; &lt;hr /&gt; &lt;h2 id=&quot;executive-summary&quot;&gt;Executive Summary&lt;/h2&gt; &lt;ul&gt; &lt;li&gt;&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; SQL Injection (unvalidated attribute parameter)&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Affected File:&lt;/strong&gt; &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;app/models/PlantsModel.php&lt;/code&gt;&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Affected Lines:&lt;/strong&gt; 335, 424, 458&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Critical (CVSS...</description>
        <pubDate>Sun, 28 Dec 2025 15:27:01 +0000</pubDate>
        <link>/critical-sql-injection-vulnerability-discovered-in-hortusfox-pending-cve-2025-6529/</link>
        <guid isPermaLink="true">/critical-sql-injection-vulnerability-discovered-in-hortusfox-pending-cve-2025-6529/</guid>
        
        <category>security</category>
        
        <category>research</category>
        
        <category>sqli</category>
        
        <category>postgres</category>
        
        <category>hacking</category>
        
        <category>oss</category>
        
        <category>cve</category>
        
        <category>research</category>
      </item>
    
      <item>
        <title>CVE-2025-64115: Unvalidated Referer Redirect &amp; SSRF in Movary</title>
        <description>&lt;p&gt;&lt;strong&gt;Author:&lt;/strong&gt; Juan Soberanes (CyberDucky)&lt;br /&gt; &lt;strong&gt;Date:&lt;/strong&gt; 2025-10-30&lt;br /&gt; &lt;strong&gt;Severity:&lt;/strong&gt; High (CVSS 8.1)&lt;br /&gt; &lt;strong&gt;CVE:&lt;/strong&gt; CVE-2025-64115&lt;br /&gt; &lt;strong&gt;GitHub Advisory:&lt;/strong&gt; GHSA-pm58-79jw-q79f&lt;/p&gt; &lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;a href=&quot;* https://github.com/leepeuker/movary/security/advisories/GHSA-pm58-79jw-q79f&quot;&gt;GitHub Advisory &lt;/a&gt;&lt;/li&gt; &lt;li&gt;&lt;a href=&quot;* https://nvd.nist.gov/vuln/detail/CVE-2025-64115&quot;&gt;NVD Listing&lt;/a&gt;&lt;/li&gt; &lt;/ul&gt; &lt;hr /&gt; &lt;h2 id=&quot;overview&quot;&gt;Overview&lt;/h2&gt; &lt;p&gt;While reviewing the &lt;strong&gt;Movary&lt;/strong&gt; codebase, I discovered a &lt;strong&gt;high-severity vulnerability&lt;/strong&gt; caused by &lt;strong&gt;unvalidated use of the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;HTTP_REFERER&lt;/code&gt; header for redirects&lt;/strong&gt;. This design flaw allowed attackers to abuse application redirect behavior, enabling both &lt;strong&gt;open redirect phishing campaigns&lt;/strong&gt; and &lt;strong&gt;potential Server-Side Request Forgery (SSRF)&lt;/strong&gt; attacks.&lt;/p&gt; &lt;p&gt;This issue was responsibly disclosed to the maintainers and has since been remediated.&lt;/p&gt; &lt;hr /&gt; &lt;h2 id=&quot;vulnerability-summary&quot;&gt;Vulnerability Summary&lt;/h2&gt; &lt;ul&gt; &lt;li&gt;&lt;strong&gt;Vulnerability...</description>
        <pubDate>Sun, 30 Nov 2025 15:05:23 +0000</pubDate>
        <link>/cve-2025-64115-unvalidated-referer-redirect-ssrf-in-movary/</link>
        <guid isPermaLink="true">/cve-2025-64115-unvalidated-referer-redirect-ssrf-in-movary/</guid>
        
        <category>security</category>
        
        <category>research</category>
        
        <category>hacking</category>
        
        <category>ssrf</category>
        
        <category>webapps</category>
        
        <category>api</category>
        
        <category>research</category>
      </item>
    
      <item>
        <title>Mining Github for CVEs!</title>
        <description>&lt;h1 id=&quot;tech-talk-mining-github-for-cve-research-with-an-enhanced-vulnerability-scanner&quot;&gt;Tech Talk: Mining GitHub for CVE Research with an Enhanced Vulnerability Scanner&lt;/h1&gt; &lt;h2 id=&quot;abstract&quot;&gt;Abstract&lt;/h2&gt; &lt;p&gt;Security research often begins with patterns — where do vulnerabilities come from, what practices make them more likely, and how can we spot them earlier? In this talk, I’ll walk through how I built an OSINT-powered vulnerability scanner for GitHub repositories that blends CVE trend analysis, Semgrep static analysis, and repository health metrics into a unified framework. You’ll see how this approach helped me identify bug-prone projects, optimize scanning for scale, and improve my own CVE research workflow.&lt;/p&gt; &lt;hr /&gt; &lt;h2 id=&quot;talk-outline&quot;&gt;Talk Outline&lt;/h2&gt; &lt;h3 id=&quot;1-why-github-osint-for-vulnerability-research-5-min&quot;&gt;1....</description>
        <pubDate>Fri, 19 Sep 2025 08:00:04 +0000</pubDate>
        <link>/mining-github-for-cves/</link>
        <guid isPermaLink="true">/mining-github-for-cves/</guid>
        
        <category>security</category>
        
        <category>research</category>
        
        <category>tech</category>
        
        <category>talk</category>
        
        <category>cybersecurity</category>
        
        <category>osint</category>
        
        <category>github</category>
        
        <category>code</category>
      </item>
    
      <item>
        <title>Blind SQL Injection in FireShare, Found in an API sort Parameter</title>
        <description>&lt;p&gt;&lt;br /&gt; Severity: High&lt;br /&gt; Impact: Sensitive Data Extraction (Usernames, Role Discovery)&lt;/p&gt; &lt;hr /&gt; &lt;h2 id=&quot;how-i-found-it&quot;&gt;How I Found It&lt;/h2&gt; &lt;p&gt;While exploring the /api/videos/public endpoint, I noticed the sort parameter was behaving oddly. Instead of rejecting unexpected values, the backend seemed to pass whatever I gave it directly into the query. That raised a red flag.&lt;/p&gt; &lt;p&gt;I suspected SQL injection, but this wasn’t a straightforward one where you instantly see errors or output. Instead, it turned out to be time-based blind SQL injection—which means the attacker gets clues from how long the server takes to respond, even if no data is...</description>
        <pubDate>Wed, 20 Aug 2025 19:52:39 +0000</pubDate>
        <link>/blind-sql-injection-in-fireshare-found-in-an-api-sort-parameter/</link>
        <guid isPermaLink="true">/blind-sql-injection-in-fireshare-found-in-an-api-sort-parameter/</guid>
        
        <category>security</category>
        
        <category>web</category>
        
        <category>filesharing</category>
        
        <category>security</category>
        
        <category>cybersecurity</category>
        
        <category>research</category>
        
        <category>hacking</category>
        
        <category>hacked</category>
        
        <category>vulnerability</category>
        
        <category>research</category>
      </item>
    
      <item>
        <title>Stored XSS FOUND! In Many Notes, The Best Note Taking APP!</title>
        <description>&lt;h1 id=&quot;how-i-found-a-stored-xss-in-markdown-rendering&quot;&gt;How I Found a Stored XSS in Markdown Rendering&lt;/h1&gt; &lt;p&gt;Severity: High (CVSS 7.3)&lt;/p&gt; &lt;hr /&gt; &lt;h2 id=&quot;the-discovery&quot;&gt;The Discovery&lt;/h2&gt; &lt;p&gt;I was testing the markdown rendering feature in the Many Notes application when something caught my eye. It looked like the application was running user content through a markdown parser and then trying to clean it with DOMPurify. On paper, that sounds safe enough. In practice, it wasn’t.&lt;/p&gt; &lt;p&gt;After a couple of quick checks, I realized I could sneak in a script tag and get it to execute. That meant the app was vulnerable to a classic stored XSS.&lt;/p&gt; &lt;hr /&gt;...</description>
        <pubDate>Wed, 20 Aug 2025 19:16:18 +0000</pubDate>
        <link>/stored-xss-found-in-many-notes-the-best-note-taking-app/</link>
        <guid isPermaLink="true">/stored-xss-found-in-many-notes-the-best-note-taking-app/</guid>
        
        <category>research</category>
        
        <category>xss</category>
        
        <category>web</category>
        
        <category>security</category>
        
        <category>hacking</category>
        
        <category>cybersecurity</category>
        
        <category>manynotes</category>
        
        <category>php</category>
        
        <category>research</category>
      </item>
    
      <item>
        <title>Blind SQL Injection Found! In Tirreno : Security Analytics</title>
        <description>&lt;!--StartFragment--&gt; &lt;p&gt;&lt;strong&gt;Uncovering a Blind SQL Injection in v0.9.5: A Deep Dive&lt;/strong&gt;&lt;/p&gt; &lt;hr /&gt; &lt;h2 id=&quot;overview&quot;&gt;Overview&lt;/h2&gt; &lt;p&gt;In my latest security audit of &lt;strong&gt;v0.9.5&lt;/strong&gt;, I discovered a &lt;strong&gt;Blind SQL Injection&lt;/strong&gt; that allows attackers to infer—and eventually extract—arbitrary data from the database. This blog post walks through:&lt;/p&gt; &lt;ul&gt; &lt;li&gt;&lt;strong&gt;Vulnerability details&lt;/strong&gt;&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Proof of Concept&lt;/strong&gt;&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Recommended Fixes&lt;/strong&gt;&lt;/li&gt; &lt;li&gt;&lt;strong&gt;Our Vulnerability Disclosure Policy&lt;/strong&gt;&lt;/li&gt; &lt;/ul&gt; &lt;p&gt;Read on to learn how this flaw works and how you can protect your own applications.&lt;/p&gt; &lt;hr /&gt; &lt;h2 id=&quot;1-what-is-blind-sql-injection&quot;&gt;1. What Is Blind SQL Injection?&lt;/h2&gt; &lt;p&gt;Blind SQL Injection is a variant of SQL Injection where the application does not directly return database errors...</description>
        <pubDate>Tue, 05 Aug 2025 23:03:28 +0000</pubDate>
        <link>/blind-sql-injection-found-in-tirreno-security-analytics/</link>
        <guid isPermaLink="true">/blind-sql-injection-found-in-tirreno-security-analytics/</guid>
        
        <category>security</category>
        
        <category>research</category>
        
        <category>sqli</category>
        
        <category>javascript</category>
        
        <category>hacking</category>
        
        <category>sql</category>
        
        <category>cybersecurity</category>
        
        <category>postgres</category>
        
        <category>research</category>
      </item>
    
      <item>
        <title>XSS Found in Asian Arts Talent Foundation</title>
        <description>&lt;h1 id=&quot;-cyberducky-strikes-again-critical-xss-vulnerability-discovered-on-aatf-website&quot;&gt;🐤 CyberDucky Strikes Again: Critical XSS Vulnerability Discovered on AATF Website&lt;/h1&gt; &lt;p&gt;&lt;strong&gt;Date Discovered:&lt;/strong&gt; June 20, 2025&lt;br /&gt; &lt;strong&gt;Target:&lt;/strong&gt; &lt;a href=&quot;http://aatf.us/&quot;&gt;Asian Arts Talents Foundation (aatf.us)&lt;/a&gt;&lt;br /&gt; &lt;strong&gt;Severity:&lt;/strong&gt; 🔥 High&lt;br /&gt; &lt;strong&gt;Vulnerability Type:&lt;/strong&gt; Reflected Cross-Site Scripting (XSS)&lt;br /&gt; &lt;strong&gt;Author:&lt;/strong&gt; Juan Soberanes – aka &lt;em&gt;CyberDucky&lt;/em&gt; 🧠💻&lt;/p&gt; &lt;h2 id=&quot;️-discovery-story&quot;&gt;🕵️ Discovery Story&lt;/h2&gt; &lt;p&gt;During a routine local assessment using the public Docker container from the &lt;a href=&quot;http://aatf.us/&quot;&gt;Asian Arts Talents Foundation&lt;/a&gt;, I uncovered a high-risk vulnerability in one of their endpoints. This wasn’t just any bug – this was a textbook case of &lt;strong&gt;Reflected XSS&lt;/strong&gt;, ripe for exploitation by malicious actors.&lt;/p&gt; &lt;p&gt;No login needed. No fancy...</description>
        <pubDate>Tue, 01 Jul 2025 08:40:45 +0000</pubDate>
        <link>/xss-found-in-asian-arts-talent-foundation-2/</link>
        <guid isPermaLink="true">/xss-found-in-asian-arts-talent-foundation-2/</guid>
        
        <category>security</category>
        
        <category>research</category>
        
        <category>xss</category>
        
        <category>javascript</category>
        
        <category>hacking</category>
        
        <category>oss</category>
        
        <category>research</category>
      </item>
    
      <item>
        <title>OSCP Cheatsheet</title>
        <description>&lt;h1 id=&quot;general&quot;&gt;General&lt;/h1&gt; &lt;aside&gt; 💡 For Finding all important files in Windows `cd c:\Users` then `tree /F` &lt;/aside&gt; &lt;h2 id=&quot;important-locations&quot;&gt;Important Locations&lt;/h2&gt; &lt;details&gt; &lt;summary&gt;Windows&lt;/summary&gt; Windows &lt;/details&gt; &lt;details&gt; &lt;summary&gt;Linux&lt;/summary&gt; ``` powershell /etc/passwd /etc/shadow /etc/aliases /etc/anacrontab /etc/apache2/apache2.conf /etc/apache2/httpd.conf /etc/apache2/sites-enabled/000-default.conf /etc/at.allow /etc/at.deny /etc/bashrc /etc/bootptab /etc/chrootUsers /etc/chttp.conf /etc/cron.allow /etc/cron.deny /etc/crontab /etc/cups/cupsd.conf /etc/exports /etc/fstab /etc/ftpaccess /etc/ftpchroot /etc/ftphosts /etc/groups /etc/grub.conf /etc/hosts /etc/hosts.allow /etc/hosts.deny /etc/httpd/access.conf /etc/httpd/conf/httpd.conf /etc/httpd/httpd.conf /etc/httpd/logs/access_log /etc/httpd/logs/access.log /etc/httpd/logs/error_log /etc/httpd/logs/error.log /etc/httpd/php.ini /etc/httpd/srm.conf /etc/inetd.conf /etc/inittab /etc/issue /etc/knockd.conf /etc/lighttpd.conf /etc/lilo.conf /etc/logrotate.d/ftp /etc/logrotate.d/proftpd /etc/logrotate.d/vsftpd.log /etc/lsb-release /etc/motd /etc/modules.conf /etc/motd /etc/mtab /etc/my.cnf /etc/my.conf /etc/mysql/my.cnf /etc/network/interfaces /etc/networks /etc/npasswd /etc/passwd /etc/php4.4/fcgi/php.ini /etc/php4/apache2/php.ini /etc/php4/apache/php.ini /etc/php4/cgi/php.ini /etc/php4/apache2/php.ini /etc/php5/apache2/php.ini /etc/php5/apache/php.ini /etc/php/apache2/php.ini /etc/php/apache/php.ini /etc/php/cgi/php.ini /etc/php.ini /etc/php/php4/php.ini /etc/php/php.ini /etc/printcap /etc/profile...</description>
        <pubDate>Thu, 19 Jun 2025 07:18:58 +0000</pubDate>
        <link>/oscp-cheatsheet/</link>
        <guid isPermaLink="true">/oscp-cheatsheet/</guid>
        
        <category>oscp</category>
        
        <category>hacking</category>
        
        <category>exam</category>
        
        <category>study</category>
        
        <category>research</category>
      </item>
    
      <item>
        <title>Offensive OSINT for Finding Software Vulnerabilities</title>
        <description>&lt;!--StartFragment--&gt; &lt;h2 id=&quot;finding-software-vulnerabilities&quot;&gt;Finding Software Vulnerabilities&lt;/h2&gt; &lt;p&gt;I’m sure you have heard of Zero Days. They are bugs that have not been found by anyone. Imagine finding one of these and reporting it as a CVE before a malicious hacker does? YOU WOULD SAVE THE PLANET . All materials are freely available at cyber-ducky.com, and will remain available after the workshop ends.&lt;/p&gt; &lt;h2 id=&quot;learning-objectives&quot;&gt;Learning Objectives&lt;/h2&gt; &lt;ul&gt; &lt;li&gt;Learn how to analyze code from open source projects for common bugs.&lt;/li&gt; &lt;li&gt;Learn how to look for potential vulnerabilities in documentation and developer forums.&lt;/li&gt; &lt;li&gt;Learn how to do Software Composition Analysis.&lt;/li&gt; &lt;li&gt;Learn how to leverage vulnerability...</description>
        <pubDate>Sun, 16 Feb 2025 16:48:40 +0000</pubDate>
        <link>/offensive-osint-for-finding-software-vulnerabilities/</link>
        <guid isPermaLink="true">/offensive-osint-for-finding-software-vulnerabilities/</guid>
        
        <category>vulnerabilities</category>
        
        <category>zeroday</category>
        
        <category>nsa</category>
        
        <category>osint</category>
        
        <category>findingvulnerabilities</category>
        
        <category>bugs</category>
        
        <category>findingbugs</category>
        
        <category>code</category>
      </item>
    
      <item>
        <title>Ultimate Guide for Staying Anonymous</title>
        <description>&lt;h2 id=&quot;ultimate-guide-to-staying-anonymous&quot;&gt;Ultimate Guide to Staying Anonymous&lt;/h2&gt; &lt;p&gt;Ever wondered how you can truly stay anonymous online ? I will be going over the steps you can do to ensure you stay as anonymous as possible. The outline is in priority order to get you anonymous as soon as possible.&lt;/p&gt; &lt;p&gt;All materials are freely available at cyber-ducky.com, and will remain available after the workshop ends.&lt;/p&gt; &lt;h2 id=&quot;learning-objectives&quot;&gt;Learning Objectives&lt;/h2&gt; &lt;ul&gt; &lt;li&gt;Learn how to obtain an anonymous phone, pc, debit card and email. &lt;/li&gt; &lt;li&gt;Learn what technologies to use when using your anonymous phone, pc, and email to stay undetected. &lt;/li&gt; &lt;li&gt;Learn how to create social...</description>
        <pubDate>Mon, 26 Aug 2024 10:52:25 +0000</pubDate>
        <link>/ultimate-guide-for-staying-anonymous/</link>
        <guid isPermaLink="true">/ultimate-guide-for-staying-anonymous/</guid>
        
        <category>anonymous</category>
        
        <category>opensourceintelligence</category>
        
        <category>nsa</category>
        
        <category>burnerphone</category>
        
        <category>burneremail</category>
        
        <category>osint</category>
        
        <category>privacy</category>
        
        <category>cia</category>
        
        <category>code</category>
      </item>
    
      <item>
        <title>Welcome to Cyber Ducky World!</title>
        <description>&lt;p&gt;I’d like to first and foremost, welcome you to the world of never ending learning. I created this Cyber Ducky Movement to educate the world about cyber security and technology. There is a beauty in being able to understand very complex systems and then modify them as you please. Everything done in this movement is for educational purposes only. We will explore many aspects of cyber security through analysis, coding, and practice.&lt;/p&gt; &lt;h2 id=&quot;what-exactly-is-the-cyber-ducky-movement&quot;&gt;What exactly is the Cyber Ducky Movement?&lt;/h2&gt; &lt;p&gt;The movement has to do with the origins of the rubber ducky. The rubber ducky has been used for many...</description>
        <pubDate>Wed, 19 Oct 2022 23:48:05 +0000</pubDate>
        <link>/welcome-to-cyber-ducky-world/</link>
        <guid isPermaLink="true">/welcome-to-cyber-ducky-world/</guid>
        
        <category>welcome</category>
        
        <category>cyberducky</category>
        
        <category>hacks</category>
        
        <category>blog</category>
      </item>
    
  </channel>
</rss>
