CVE-2011-0497

Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../\" (dot dot forward-slash backslash) sequences in a crafted request.
Path Traversal
Severity
UNKNOWN
AV:N/AC:L/Au:N/C:C/I:N/A:N
Atk. Vector
NETWORK
Atk. Complexity
LOW
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
sybaseappeon_for_powerbuilder
2.5
sybaseappeon_for_powerbuilder
2.6
sybaseappeon_for_powerbuilder
2.7
sybaseappeon_for_powerbuilder
2.8
sybaseappeon_for_powerbuilder
6.0
sybaseappeon_for_powerbuilder
6.1
sybaseappeon_for_powerbuilder
6.2
sybaseappeon_for_powerbuilder
6.5
sybaseeaserver
5.0
sybaseeaserver
5.0.1
sybaseeaserver
5.1
sybaseeaserver
5.2
sybaseeaserver
5.2.1
sybaseeaserver
5.3
sybaseeaserver
5.5
sybaseeaserver
6.0
sybaseeaserver
6.0.2
sybaseeaserver
6.1
sybaseeaserver
6.2
sybaseeaserver
6.3
sybaseeaserver
6.3.1
sybasereplication_server
*
sybasereplication_server
15.2
sybasesybase_workspace
*
sybasesybase_workspace
1.0
sybasesybase_workspace
1.5
sybasesybase_workspace
1.6
sybasesybase_workspace
1.7
sybasesybase_workspace
2.0
sybasesybase_workspace
2.0.1
sybasesybase_workspace
2.0.2
sybasesybase_workspace
2.1
sybasesybase_workspace
2.1.2
sybasesybase_workspace
2.5
𝑥
= Vulnerable software versions