CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
78.0%
Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "…/" (dot dot forward-slash backslash) sequences in a crafted request.
Vendor | Product | Version | CPE |
---|---|---|---|
sybase | appeon_for_powerbuilder | 2.5 | cpe:2.3:a:sybase:appeon_for_powerbuilder:2.5:*:*:*:*:*:*:* |
sybase | appeon_for_powerbuilder | 2.6 | cpe:2.3:a:sybase:appeon_for_powerbuilder:2.6:*:*:*:*:*:*:* |
sybase | appeon_for_powerbuilder | 2.7 | cpe:2.3:a:sybase:appeon_for_powerbuilder:2.7:*:*:*:*:*:*:* |
sybase | appeon_for_powerbuilder | 2.8 | cpe:2.3:a:sybase:appeon_for_powerbuilder:2.8:*:*:*:*:*:*:* |
sybase | appeon_for_powerbuilder | 6.0 | cpe:2.3:a:sybase:appeon_for_powerbuilder:6.0:*:*:*:*:*:*:* |
sybase | appeon_for_powerbuilder | 6.1 | cpe:2.3:a:sybase:appeon_for_powerbuilder:6.1:*:*:*:*:*:*:* |
sybase | appeon_for_powerbuilder | 6.2 | cpe:2.3:a:sybase:appeon_for_powerbuilder:6.2:*:*:*:*:*:*:* |
sybase | appeon_for_powerbuilder | 6.5 | cpe:2.3:a:sybase:appeon_for_powerbuilder:6.5:*:*:*:*:*:*:* |
sybase | easerver | 5.0 | cpe:2.3:a:sybase:easerver:5.0:*:*:*:*:*:*:* |
sybase | easerver | 5.0.1 | cpe:2.3:a:sybase:easerver:5.0.1:*:*:*:*:*:*:* |