7.8
CVE-2011-0497
- EPSS 0.81%
- Veröffentlicht 20.01.2011 19:00:09
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../\" (dot dot forward-slash backslash) sequences in a crafted request.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sybase ≫ Appeon For Powerbuilder Version2.5
Sybase ≫ Appeon For Powerbuilder Version2.6
Sybase ≫ Appeon For Powerbuilder Version2.7
Sybase ≫ Appeon For Powerbuilder Version2.8
Sybase ≫ Appeon For Powerbuilder Version6.0
Sybase ≫ Appeon For Powerbuilder Version6.1
Sybase ≫ Appeon For Powerbuilder Version6.2
Sybase ≫ Appeon For Powerbuilder Version6.5
Sybase ≫ Replication Server Editionmessaging
Sybase ≫ Replication Server Version15.2 Editionmessaging
Sybase ≫ Sybase Workspace Version1.0
Sybase ≫ Sybase Workspace Version1.5
Sybase ≫ Sybase Workspace Version1.6
Sybase ≫ Sybase Workspace Version1.7
Sybase ≫ Sybase Workspace Version2.0
Sybase ≫ Sybase Workspace Version2.0.1
Sybase ≫ Sybase Workspace Version2.0.2
Sybase ≫ Sybase Workspace Version2.1
Sybase ≫ Sybase Workspace Version2.1.2
Sybase ≫ Sybase Workspace Version2.5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.81% | 0.719 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:C/I:N/A:N
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.