Sysax Multi Server 6.95 contains a denial of service vulnerability in the administrative password field that allows attackers to crash the application. Attackers can overwrite the password field with 800 bytes of repeated characters to trigger an application crash and disrupt server functionality.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51066 | Exploit Third Party Advisory VDB Entry |
| https://www.sysax.com/ | Product |
| https://www.vulncheck.com/advisories/sysax-multi-server-password-denial-of-service-poc | Third Party Advisory |
| https://www.exploit-db.com/exploits/51066 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/sysax-multi-server-password-denial-of-service-poc | Third Party Advisory |
Configurations
History
26 Jan 2026, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
22 Jan 2026, 20:33
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/51066 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.sysax.com/ - Product | |
| References | () https://www.vulncheck.com/advisories/sysax-multi-server-password-denial-of-service-poc - Third Party Advisory | |
| First Time |
Sysax multi Server
Sysax |
|
| CPE | cpe:2.3:a:sysax:multi_server:6.95:*:*:*:*:*:*:* |
14 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/51066 - | |
| References | () https://www.vulncheck.com/advisories/sysax-multi-server-password-denial-of-service-poc - |
13 Jan 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:16
Updated : 2026-01-26 16:15
NVD link : CVE-2023-54337
Mitre link : CVE-2023-54337
CVE.ORG link : CVE-2023-54337
JSON object : View
Products Affected
sysax
- multi_server
CWE
CWE-1284
Improper Validation of Specified Quantity in Input
