Michael Heinzl
27 exploits
Active since Nov 2022
Traccar - Unrestricted File Upload
CVSS 8.5
Traccar - Unrestricted File Upload
CVSS 8.5
Palo Alto Expedition Remote Code Execution (CVE-2024-5910 and CVE-2024-9464)
CVSS 9.8
mySCADA myPRO Manager - Info Disclosure
CVSS 10.0
POWERCOM UPSMON PRO Path Traversal (CVE-2022-38120) and Credential Harvester (CVE-2022-38121)
CVSS 6.5
ThinManager Path Traversal (CVE-2023-2915) Arbitrary File Delete
CVSS 7.5
ThinManager Path Traversal (CVE-2023-27855) Arbitrary File Upload
CVSS 9.8
ThinManager Path Traversal (CVE-2023-2917) Arbitrary File Upload
CVSS 9.8
mySCADA myPRO Manager Credential Harvester (CVE-2025-24865 and CVE-2025-22896)
CVSS 8.6
Ivanti Virtual Traffic Manager Authentication Bypass (CVE-2024-7593)
CVSS 9.8
Cisco Smart Software Manager (SSM) On-Prem Account Takeover (CVE-2024-20419)
CVSS 10.0
Control iD iDSecure Authentication Bypass (CVE-2023-6329)
CVSS 9.8
WhatsUp Gold SQL Injection (CVE-2024-6670)
CVSS 9.8
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
CVSS 9.8
SolarWinds Web Help Desk - Hardcoded Credential
CVSS 9.1
ThinManager Path Traversal (CVE-2023-27856) Arbitrary File Download
CVSS 7.5
USPSON PRO - Info Disclosure
CVSS 6.5
Sante PACS Server Path Traversal (CVE-2025-2264)
CVSS 7.5
Calibre 6.9.0-7.14.0 - Unauthenticated RCE
CVSS 9.8
LG Simple Editor Command Injection (CVE-2023-40504)
CVSS 9.8
Samsung MagicINFO 9 Server Remote Code Execution (CVE-2024-7399)
CVSS 8.8
DIAEnergie SQL Injection (CVE-2024-4548)
CVSS 9.8
mySCADA myPRO Manager Unauthenticated Command Injection (CVE-2024-47407)
CVSS 10.0
mySCADA MyPRO Authenticated Command Injection (CVE-2023-28384)
CVSS 8.8
Paloaltonetworks Expedition < 1.2.96 - OS Command Injection
CVSS 6.5