Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hcjh-vxw9-5294

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../" (dot dot forward-slash backslash) sequences in a crafted request.

Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../" (dot dot forward-slash backslash) sequences in a crafted request.

EPSS

Процентиль: 74%
0.00805
Низкий

Дефекты

CWE-22

Связанные уязвимости

nvd
около 15 лет назад

Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../\" (dot dot forward-slash backslash) sequences in a crafted request.

EPSS

Процентиль: 74%
0.00805
Низкий

Дефекты

CWE-22