what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files

Sysax 5.60 Create SSL Certificate Buffer Overflow
Posted Jun 4, 2012
Authored by Craig Freyman

Sysax versions 5.60 and below suffer from a buffer overflow vulnerability when creating an SSL certificate.

tags | exploit, overflow
SHA-256 | 25b09a6e92ff4d9c00a80eaae87713ec5fe32db0a7d9c1c488dd9ed1a7a31810

Related Files

Sysax FTP Automation 6.9.0 Privilege Escalation
Posted Mar 22, 2022
Authored by bzyo

Sysax FTP Automation version 6.9.0 suffers from a privilege escalation vulnerability.

tags | exploit
SHA-256 | 0d1f128c36b76104f0a93acb426524279136ba031351dd6693ec4853837a0875
Sysax MultiServer 6.90 Cross Site Scripting
Posted Jun 14, 2020
Authored by Luca Epifanio

Sysax MultiServer version 6.90 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2020-13228
SHA-256 | ed3d06b6a83507f557a739c44f4278c3ac358d7c4c64027179099ce40a4b96cb
Sysax Multi Server 5.50 Denial Of Service
Posted Jan 20, 2020
Authored by Shailesh Kumavat

Sysax Multi Server version 5.50 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | b34b8a7546ee09efdaaa9a53f6f6efd84147a3ee518dbf8b1da21b551b77ac99
Sysax Multi Server 6.50 SEH Overflow
Posted Mar 21, 2016
Authored by Paul Purcell

Sysax Multi Server version 6.50 HTTP file share SEH overflow remote code execution exploit.

tags | exploit, remote, web, overflow, code execution
SHA-256 | c00ceddd52d084e84687306a20618247ce5e46f255ec2f4e36d4c94b92151b3f
Sysax Multi Server 6.10 SSH Denial Of Service
Posted Apr 10, 2013
Authored by Matt Andreko

Sysax Multi Server version 6.10 suffers from an SSH denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 50cbbd9b67f7808e61c6265a8082071e7d09c673279aac4a56165ac92bd9fc96
Secunia Security Advisory 51173
Posted Nov 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Craig Freyman has discovered a security issue in Sysax FTP Automation, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 9e91cffe066f63c143bdb28036111e8893c4ae042e7cba29651cc45ab9b17536
Sysax FTP Automation Server 5.33 Privilege Escalation
Posted Nov 5, 2012
Authored by Craig Freyman

Sysax FTP Automation Server version 5.33 suffers from a local privilege escalation vulnerability.

tags | exploit, local
SHA-256 | 9da75d5d121541879919ac465b91055fed3c2f21871f370c68a97149904b4bfa
Sysax Multi Server 5.64 Create Folder Buffer Overflow
Posted Aug 20, 2012
Authored by Matt Andreko | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the create folder function in Sysax Multi Server 5.64. This issue was fixed in 5.66. In order to trigger the vulnerability valid credentials with the create folder permission must be provided. The HTTP option must be enabled on Sysax too. This Metasploit module will log into the server, get a SID token, find the root folder, and then proceed to exploit the server. Successful exploits result in SYSTEM access. This exploit works on XP SP3, and Server 2003 SP1-SP2.

tags | exploit, web, overflow, root
SHA-256 | 422ebcc0706927fdc0d3540364b547ee04c57ddb23038a64dcb8dc6be41b6f88
Secunia Security Advisory 50079
Posted Jul 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Matt Andreko has discovered a vulnerability in Sysax Multi Server, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 71fe00730c13e486b11af93f71da030e282f264f8d07e2095ab2d8eaaf66fbbf
Sysax Multi Server 5.64 Buffer Overflow
Posted Jul 29, 2012
Authored by Craig Freyman, Matt Andreko | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the create folder function in Sysax Multi Server 5.64. This issue was fixed in 5.66. You must have valid credentials to trigger the vulnerability. Your credentials must also have the create folder permission and the HTTP option has to be enabled. This Metasploit module will log into the server, get your a SID token and then proceed to exploit the server. Successful exploits result in LOCALSYSTEM access. This exploit works on XP SP3, and Server 2003 SP1-SP2.

tags | exploit, web, overflow
SHA-256 | 121e5304fc0c68efcbe91a4bd17f067fad4fef74c609ee089fb5929981de2e57
Sysax 5.62 Admin Interface Local Buffer Overflow
Posted Jun 20, 2012
Authored by Craig Freyman

Sysax versions 5.62 ad below administrative interface local buffer overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell, local
SHA-256 | 7efb7cd16bdaabc3ae5c671cbe33491c4a4f524a9fb6e3dd1b168c19d3339372
Secunia Security Advisory 48673
Posted Apr 4, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Craig Freyman has discovered a vulnerability in Sysax Multi Server, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | f288c93885351df570fbcd01c3d30ede8b250249ef9249f5888f522e06f97078
Sysax Multi Server 5.57 Directory Traversal
Posted Apr 4, 2012
Authored by Craig Freyman

Sysax Multi Server versions 5.57 and below remote directory traversal tool that requires authentication.

tags | exploit, remote
SHA-256 | a7afbf931d01a29f94a41708a24d2f4c3bf1d3ead791e9f5fb51183c4d5fa32b
Sysax 5.53 SSH Username Buffer Overflow
Posted Mar 5, 2012
Authored by sinn3r, Craig Freyman | Site metasploit.com

This Metasploit module exploits a vulnerability found in Sysax's SSH service. By supplying a long username, the SSH server will copy that data on the stack without any proper bounds checking, therefore allowing remote code execution under the context of the user. Please note that previous versions (before 5.53) are also affected by this bug.

tags | exploit, remote, code execution
advisories | OSVDB-79689
SHA-256 | 4c79bc67dd01aa9c6f086a33e5e924a0b8feec60ac0ce68bacb83a81e643b256
Secunia Security Advisory 48188
Posted Feb 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Craig Freyman has reported two vulnerabilities in Sysax Multi Server, which can be exploited by malicious users and malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | e62be4301271219c16257a438baa9cb0ad944ec9deb4232035aaf72d120e32f5
Sysax 5.53 SSH Username Buffer Overflow Exploit
Posted Feb 27, 2012
Authored by Craig Freyman

Sysax Multi Server versions 5.53 and below SSH username buffer overflow pre-authentication remote code execution exploit with egghunter shellcode that binds a shell to port 4444.

tags | exploit, remote, overflow, shell, shellcode, code execution
SHA-256 | 1a9e244ba23211e8a0745f4370e9f10d0e94ad75ca261b64e8e40b6e0606839f
Sysax Multi Server 5.53 SFTP Post Auth SEH Exploit
Posted Feb 27, 2012
Authored by Craig Freyman

Sysax Multi Server version 5.53 SFTP post authentication SEH exploit with egghunter shellcode that binds a shell to port 4444.

tags | exploit, shell, shellcode
SHA-256 | e3ee80f9e583422dca0ef40fef6b1c192c1da12311e53628b885e95e7f419bbe
Sysax Multi Server 5.52 Buffer Overflow
Posted Feb 10, 2012
Authored by Craig Freyman

Sysax Multi Server version 5.52 and below file rename buffer overflow exploit with egghunter shellcode that spawns a shell on port 4444.

tags | exploit, overflow, shell, shellcode
SHA-256 | fd8d36251f2ddc9fcea601c55652a9a591bf0d2d18d9d9b24252773e06529a61
Sysax Multi Server 5.50 Create Folder Buffer Overflow
Posted Jan 26, 2012
Authored by Craig Freyman | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the create folder function in Sysax Multi Server 5.50. This issue was fixed in 5.52. You must have valid credentials to trigger the vulnerability. Your credentials must also have the create folder permission and the HTTP option has to be enabled. This Metasploit module will log into the server, get your a SID token and then proceed to exploit the server. Successful exploits result in LOCALSYSTEM access. This exploit works on XP and 2003.

tags | exploit, web, overflow
SHA-256 | 9c89a9721eaaf34e5b28601af5c5497ccf1f5855860d05b1399eb663bcde037c
Sysax Multi Server 5.50 Buffer Overflow
Posted Jan 18, 2012
Authored by Craig Freyman

Sysax Multi Server version 5.50 create folder buffer overflow exploit with bindshell code for port 4444.

tags | exploit, overflow
SHA-256 | adb60108b3c26535f2e749d1b39e34638903b0dd0688adf1d5ebfc97c819ccc6
Sysax Multi Server Add Administrator
Posted Jun 29, 2010
Site accensussecurity.com

Sysax Multi Server add administrator exploit.

tags | exploit, add administrator
SHA-256 | 4d877af9359446ddc4f840c14fddf8079898e34129c55edb20886240b3e22148
Secunia Security Advisory 40313
Posted Jun 28, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - leinakesi has discovered some vulnerabilities in Sysax Multi Server, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 655c161c303d57643c77c006d75d4d24129b963b15b42f05f383e61138fca655
Sysax Multi Server 5.25 Denial Of Service
Posted Jun 23, 2010
Authored by leinakesi

Sysax Multi Server version 5.25 suffers from denial of service vulnerabilities.

tags | exploit, denial of service, vulnerability
SHA-256 | 38e28b8ca34f7d09b76c40fd944821c5776f8cfafd638821d08b74cf4dd71b62
Secunia Security Advisory 34433
Posted Mar 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jonathan Salwan has discovered a vulnerability in Sysax Multi Server, which can be exploited by malicious users to bypass certain security restrictions, disclose sensitive information, and potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 81a041b04579607d1f824ea5398912e8447e40d340748eef091fdc6baf5e21c9
Sysax Multi Server 4.3 File Deletion
Posted Mar 23, 2009
Authored by Jonathan Salwan | Site shell-storm.org

Sysax Multi Server version 4.3 remote arbitrary file deletion exploit.

tags | exploit, remote, arbitrary
SHA-256 | bcff2726d61f79159743a1a6d83e1e1297ac107021d5af54664905682a92e38e
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    4 Files
  • 19
    Aug 19th
    7 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close