exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 41 of 41 RSS Feed

Files from Pouya Daneshmand

Email addresspouya at securitylab.ir
First Active2009-08-11
Last Active2013-08-23
Joomla Weblinks SQL Injection
Posted Mar 30, 2010
Authored by Pouya Daneshmand

The Joomla Weblinks component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f7abed5b1e3fc9c469ec4bc657f6e4ea67b816feadd281b8d1527b94009557eb
Free Real Estate Contact Form 1.09 Local File Inclusion
Posted Mar 16, 2010
Authored by Pouya Daneshmand

Free Real Estate Contact Form version 1.09 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 9704856e0f082a62d5fa1de0e04b91c328256fa892fd19f381864f764e2835ea
Short URL 1.01 Local File Inclusion
Posted Mar 16, 2010
Authored by Pouya Daneshmand

Short URL version 1.01 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 710a097c4dd6d948fc0c77ba157797b1c91b9ce63c6086ca0c754dafa2e80190
Address Book Script 1.9 Local File Inclusion
Posted Mar 16, 2010
Authored by Pouya Daneshmand

Address Book Script version 1.9 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 8a43594c58c8cd41598a0db34e68a4145ce18e5bcb5e3714b37226006952eb8f
River CMS 1.0 SQL Injection
Posted Mar 9, 2010
Authored by Pouya Daneshmand

River CMS version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | eceaf0c5520ec0d47cf564935d3b7f14931412c77ad6575a55d21f8156f74d86
Official Portal 2007 Cross Site Scripting / SQL Injection
Posted Feb 23, 2010
Authored by Pouya Daneshmand

Official Portal 2007 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 682838ce85b5b99509b886de7303f3d8a09579725b01a35ff0012d7c3e4834bc
Pixel Portal SQL Injection
Posted Feb 17, 2010
Authored by Pouya Daneshmand

Pixel Portal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 58642a988f04600193625a4de6fabb0ced026eb401c6bb6cf399e05b4f3889e1
Joomla Jw_allVideos Remote File Download
Posted Feb 15, 2010
Authored by Pouya Daneshmand

Joomla Jw_allVideos version 1.0 suffers from a remote file download vulnerability.

tags | exploit, remote
SHA-256 | 57293534d8897d79265115886fb1125388855ae5b13e523c01e4e1b219a439fb
Zomorrod CMS SQL Injection
Posted Feb 10, 2010
Authored by Pouya Daneshmand

Zomorrod CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0b26af37ace660ffd257755a383e61ab47239725ba11dfff398513d5f7365922
Mongoose 2.8 Source Disclosure
Posted Feb 9, 2010
Authored by Pouya Daneshmand

Mongoose version 2.8 seems to suffer from yet another source disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | ce0273abac1e5b5556ab0d333a6c5639b2ad1a86e8b652df491e20142ea172fd
Tavanmand Portal 1.1 Shell Upload
Posted Jan 31, 2010
Authored by Pouya Daneshmand

Tavanmand Portal version 1.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | fb168fa44563091154600a5cd9651be6263e25297384567ff0934a5b1c34233d
RoakCMS Shell Upload / Directory Traversal
Posted Jan 31, 2010
Authored by Pouya Daneshmand

RaakCMS suffers from shell upload and directory traversal vulnerabilities.

tags | exploit, shell, vulnerability, file inclusion
SHA-256 | f61f656cd196728cc713a69e33c70b17c446e8f1d860cf604928eca092e75851
eWebeditor Traversal / Shell Upload / Bypass / Disclosure
Posted Jan 31, 2010
Authored by Pouya Daneshmand

eWebeditor suffers from administrative bypass, database disclosure, shell upload and directory traversal vulnerabilities.

tags | exploit, shell, vulnerability, bypass, info disclosure, file upload
SHA-256 | 4f156dfd0510795ce33ae305fe001950b391154e8114400d6479a2fa300fceb3
Microsoft Internet Explorer 6 / 7 Local Crash
Posted Jan 27, 2010
Authored by Pouya Daneshmand

Microsoft Internet Explorer versions 6 and 7 local crash exploit.

tags | exploit, local
SHA-256 | 4919b1da84a18ee8dd1946be9767fbd69d36552aef4bed91d749811ec7aa7886
eWebEditor Directory Traversal
Posted Jan 22, 2010
Authored by Pouya Daneshmand

eWebEditor suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 39ef626f478540c65864cc2ae871677d6b538b5003ab3ccfe7066098a8b171ed
eWebEditor Remote File Upload
Posted Aug 11, 2009
Authored by Pouya Daneshmand

eWebEditor suffers from an unauthenticated file upload vulnerability.

tags | exploit, file upload
SHA-256 | d0d15a8ebbd8f0b30562481d01a2b0dc7651d4755e70ee7d8b88e11600027172
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close