Sysax Multi Server 6.95 contains a denial of service vulnerability in the administrative password field that allows attackers to crash the application. Attackers can overwrite the password field with 800 bytes of repeated characters to trigger an application crash and disrupt server functionality.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51066 | Exploit Third Party Advisory VDB Entry |
| https://www.sysax.com/ | Product |
| https://www.vulncheck.com/advisories/sysax-multi-server-password-denial-of-service-poc | Third Party Advisory |
| https://www.exploit-db.com/exploits/51066 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/sysax-multi-server-password-denial-of-service-poc | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-13 23:16
Updated : 2026-01-26 16:15
NVD link : CVE-2023-54337
Mitre link : CVE-2023-54337
CVE.ORG link : CVE-2023-54337
JSON object : View
Products Affected
sysax
- multi_server
CWE
CWE-1284
Improper Validation of Specified Quantity in Input
