7.8
CVSSv2

CVE-2011-0497

Published: 20/01/2011 Updated: 17/08/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in Sybase EAServer 6.x prior to 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote malicious users to read arbitrary files via "../\" (dot dot forward-slash backslash) sequences in a crafted request.

Vulnerable Product Search on Vulmon Subscribe to Product

sybase easerver 6.1

sybase easerver 6.2

sybase easerver 5.2.1

sybase easerver 5.3

sybase appeon_for_powerbuilder 6.1

sybase appeon_for_powerbuilder 6.2

sybase sybase_workspace 1.7

sybase sybase_workspace 2.0

sybase easerver 5.0

sybase easerver 5.0.1

sybase appeon_for_powerbuilder 2.6

sybase appeon_for_powerbuilder 2.7

sybase sybase_workspace

sybase sybase_workspace 1.0

sybase sybase_workspace 2.1

sybase sybase_workspace 2.1.2

sybase easerver 6.0

sybase easerver 6.0.2

sybase easerver 5.1

sybase easerver 5.2

sybase appeon_for_powerbuilder 2.8

sybase appeon_for_powerbuilder 6.0

sybase sybase_workspace 1.5

sybase sybase_workspace 1.6

sybase sybase_workspace 2.5

sybase easerver 6.3

sybase easerver 6.3.1

sybase easerver 5.5

sybase appeon_for_powerbuilder 2.5

sybase appeon_for_powerbuilder 6.5

sybase replication_server 15.2

sybase replication_server

sybase sybase_workspace 2.0.1

sybase sybase_workspace 2.0.2