Vulnerabilities
Vulnerable Software
Flexense:  >> Sysgauge  Security Vulnerabilities
SysGauge Server 7.9.18 contains an unquoted service path vulnerability in its binary path configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in 'C:\Program Files\SysGauge Server\bin\sysgaus.exe' to inject malicious executables and escalate privileges.
CVSS Score
7.8
EPSS Score
0.0
Published
2026-01-16
The server in Flexense SysGauge 3.6.18 operating on port 9221 can be exploited remotely with the attacker gaining system-level access because of a Buffer Overflow.
CVSS Score
8.1
EPSS Score
0.293
Published
2018-01-23
In Flexense SysGauge Server 3.6.18, the Control Protocol suffers from a denial of service. The attack vector is a crafted SERVER_GET_INFO packet sent to control port 9221.
CVSS Score
7.5
EPSS Score
0.124
Published
2017-12-28
An issue was discovered in SysGauge 1.5.18. A buffer overflow vulnerability in SMTP connection verification leads to arbitrary code execution. The attack vector is a crafted SMTP daemon that sends a long 220 (aka "Service ready") string.
CVSS Score
9.8
EPSS Score
0.646
Published
2017-03-06


Contact Us

Shodan ® - All rights reserved