Sysax

Multi Server

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 13.01.2026 22:52:08
  • Zuletzt bearbeitet 26.01.2026 16:15:56

Sysax Multi Server 6.95 contains a denial of service vulnerability in the administrative password field that allows attackers to crash the application. Attackers can overwrite the password field with 800 bytes of repeated characters to trigger an app...

Exploit
  • EPSS 69.06%
  • Veröffentlicht 13.08.2025 20:53:55
  • Zuletzt bearbeitet 24.09.2025 00:24:26

Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without prope...

Exploit
  • EPSS 48.91%
  • Veröffentlicht 05.08.2025 20:15:35
  • Zuletzt bearbeitet 02.10.2025 17:32:44

A denial-of-service vulnerability exists in Sysax Multi-Server version 6.10 via its SSH daemon. A specially crafted SSH key exchange packet can trigger a crash in the service, resulting in loss of availability. The flaw is triggered during the handli...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 05.03.2025 18:15:37
  • Zuletzt bearbeitet 23.09.2025 19:12:41

Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets.

Exploit
  • EPSS 0.06%
  • Veröffentlicht 02.12.2024 16:15:12
  • Zuletzt bearbeitet 24.09.2025 19:10:51

Sysax Multi Server 6.99 is vulnerable to Cross Site Scripting (XSS) via the /scgi?sid parameter.

Exploit
  • EPSS 0.85%
  • Veröffentlicht 19.08.2020 16:15:11
  • Zuletzt bearbeitet 21.11.2024 05:13:54

When uploading a file in Sysax Multi Server 6.90, an authenticated user can modify the filename="" parameter in the uploadfile_name1.htm form to a length of 368 or more bytes. This will create a buffer overflow condition, causing the application to c...

Exploit
  • EPSS 0.53%
  • Veröffentlicht 02.06.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:50

An issue was discovered in Sysax Multi Server 6.90. An attacker can determine the username (under which the web server is running) by triggering an invalid path permission error. This bypasses the fakepath protection mechanism.

Exploit
  • EPSS 9.06%
  • Veröffentlicht 02.06.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:50

An issue was discovered in Sysax Multi Server 6.90. There is reflected XSS via the /scgi sid parameter.

Exploit
  • EPSS 0.34%
  • Veröffentlicht 02.06.2020 14:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:50

An issue was discovered in Sysax Multi Server 6.90. A session can be hijacked if one observes the sid value in any /scgi URI, because it is an authentication token.

Exploit
  • EPSS 63.82%
  • Veröffentlicht 31.01.2013 05:44:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in Sysax Multi Server before 5.52, when HTTP is enabled, allows remote authenticated users with the create folder permission to execute arbitrary code via a crafted request.