CVE-2011-0497
Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../\" (dot dot forward-slash backslash) sequences in a crafted request.
Path Traversal
Vendor | Product | Version |
---|---|---|
sybase | appeon_for_powerbuilder | 2.5 |
sybase | appeon_for_powerbuilder | 2.6 |
sybase | appeon_for_powerbuilder | 2.7 |
sybase | appeon_for_powerbuilder | 2.8 |
sybase | appeon_for_powerbuilder | 6.0 |
sybase | appeon_for_powerbuilder | 6.1 |
sybase | appeon_for_powerbuilder | 6.2 |
sybase | appeon_for_powerbuilder | 6.5 |
sybase | easerver | 5.0 |
sybase | easerver | 5.0.1 |
sybase | easerver | 5.1 |
sybase | easerver | 5.2 |
sybase | easerver | 5.2.1 |
sybase | easerver | 5.3 |
sybase | easerver | 5.5 |
sybase | easerver | 6.0 |
sybase | easerver | 6.0.2 |
sybase | easerver | 6.1 |
sybase | easerver | 6.2 |
sybase | easerver | 6.3 |
sybase | easerver | 6.3.1 |
sybase | replication_server | * |
sybase | replication_server | 15.2 |
sybase | sybase_workspace | * |
sybase | sybase_workspace | 1.0 |
sybase | sybase_workspace | 1.5 |
sybase | sybase_workspace | 1.6 |
sybase | sybase_workspace | 1.7 |
sybase | sybase_workspace | 2.0 |
sybase | sybase_workspace | 2.0.1 |
sybase | sybase_workspace | 2.0.2 |
sybase | sybase_workspace | 2.1 |
sybase | sybase_workspace | 2.1.2 |
sybase | sybase_workspace | 2.5 |
Common Weakness Enumeration