Directory traversal vulnerability in Sybase EAServer 6.x...
High severity
Unreviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jan 20, 2011
Published to the GitHub Advisory Database
May 17, 2022
Last updated
Jan 27, 2023
Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../" (dot dot forward-slash backslash) sequences in a crafted request.
References