Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-6601 | Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service. |
Wed, 24 Sep 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sysax:multi_server:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Sat, 16 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sysax
Sysax multi Server |
|
| Vendors & Products |
Sysax
Sysax multi Server |
Thu, 14 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service. | |
| Title | Sysax Multi Server < 5.55 SSH Username Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T11:14:05.733Z
Reserved: 2025-08-11T19:44:04.752Z
Link: CVE-2012-10060
Updated: 2025-08-14T13:45:14.312Z
Status : Analyzed
Published: 2025-08-13T21:15:30.600
Modified: 2025-09-24T00:24:26.233
Link: CVE-2012-10060
No data.
OpenCVE Enrichment
Updated: 2025-08-16T21:41:20Z
EUVD