Craig Freyman (@cd1zz)

4 exploits Active since Aug 2025
CVE-2012-10060 EXPLOITDB CRITICAL python WORKING POC
Sysax Multi Server <5.55 - Buffer Overflow
Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service.
CVSS 9.8
EIP-2026-119157 EXPLOITDB python WORKING POC
Solar FTP Server 2.1.1 - PASV Buffer Overflow
EIP-2026-119199 EXPLOITDB python WORKING POC
Sysax Multi Server 5.53 - SFTP (Authenticated) (SEH)
EIP-2026-118320 EXPLOITDB python WORKING POC
BigAnt Server 2.97 - DDNF 'Username' Remote Buffer Overflow