Martin Eiszner

12 exploits Active since Oct 2003
EIP-2026-112835 EXPLOITDB perl SCANNER
Typo3 3.5 b5 - HTML Hidden Form Field Information Disclosure (1)
EIP-2026-112833 EXPLOITDB perl SCANNER
Typo3 3.5 b5 - 'showpic.php' File Enumeration
EIP-2026-112834 EXPLOITDB text WORKING POC
Typo3 3.5 b5 - 'Translations.php' Remote File Inclusion
EIP-2026-112836 EXPLOITDB perl WORKING POC
Typo3 3.5 b5 - HTML Hidden Form Field Information Disclosure (2)
EIP-2026-110647 EXPLOITDB html WORKING POC
PHP Arena paFileDB 1.1.3/2.1.1/3.0/3.1 - Arbitrary File Upload / Execution
CVE-2003-0747 EXPLOITDB text WORKING POC
SAP ITS 4620.2.0.323011 - Info Disclosure
wgate.dll in SAP Internet Transaction Server (ITS) 4620.2.0.323011 allows remote attackers to obtain potentially sensitive information such as directory structure and operating system via incorrect parameters (1) ~service, (2) ~templatelanguage, (3) ~language, (4) ~theme, or (5) ~template, which leaks the information in the resulting error message.
CVE-2003-0749 EXPLOITDB text WORKING POC
SAP ITS 4620.2.0.323011 - XSS
Cross-site scripting (XSS) vulnerability in wgate.dll for SAP Internet Transaction Server (ITS) 4620.2.0.323011 allows remote attackers to insert arbitrary web script and steal cookies via the ~service parameter.
CVE-2003-0748 EXPLOITDB text WRITEUP
SAP ITS 4620.2.0.323011 - Path Traversal
Directory traversal vulnerability in wgate.dll for SAP Internet Transaction Server (ITS) 4620.2.0.323011 allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the ~theme parameter and a ~template parameter with a filename followed by space characters, which can prevent SAP from effectively adding a .html extension to the filename.
EIP-2026-103886 EXPLOITDB perl WORKING POC
CSO Lanifex Outreach Project Tool 0.946b - Request Origin Spoofing
CVE-2003-1386 EXPLOITDB text WRITEUP
Axis 2400 Video Server - Access Control
AXIS 2400 Video Server 2.00 through 2.33 allows remote attackers to obtain sensitive information via an HTTP request to /support/messages, which displays the server's /var/log/messages file.
EIP-2026-100714 EXPLOITDB text WRITEUP
Axis Communications Video Server 2.x - 'Command.cgi' File Creation
CVE-2004-1878 EXPLOITDB text WRITEUP
LINBOX LIN:BOX - Auth Bypass
LINBOX LIN:BOX allows remote attackers to bypass authentication, obtain sensitive information, or gain access via a direct request to admin/user.pl preceded by // (double leading slash).