postgres database information passing in request can we exploit further? [closed]

Application login request is shown below.
The postgres information is passed via the cabinetName parameter. Is it a vulnerability? is it useful? can we exploit it?
or any other ways to exploit below request?
POST /<REDACTED>/LoginSer… Continue reading postgres database information passing in request can we exploit further? [closed]

Is it possible to sqli a url, which throw blank body and 400 code when SQL error? [closed]

I have a URL, which looks like:
POST /v1/api/user/resetUserPassword

this API only accepts 1 parameter: email
and the response looks like:

200 when parameter is valid, and everything is OK in backend, e.g. email=iamgood@example.com, ret… Continue reading Is it possible to sqli a url, which throw blank body and 400 code when SQL error? [closed]

HashiCorp Vault vulnerability could lead to RCE, patch today! (CVE-2023-0620)

Oxeye discovered a new vulnerability (CVE-2023-0620) in the HashiCorp Vault Project, an identity-based secrets and encryption management system that controls access to API encryption keys, passwords, and certificates. The vulnerability was an SQL injec… Continue reading HashiCorp Vault vulnerability could lead to RCE, patch today! (CVE-2023-0620)