RSS   Vulnerabilities for 'Easerver'   RSS

2012-08-15
 
CVE-2012-4340

CWE-79
 

 
Cross-site scripting (XSS) vulnerability in Sybase EAServer before 6.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

 
2011-06-09
 
CVE-2011-2474

CWE-22
 

 
Directory traversal vulnerability in the HTTP Server in Sybase EAServer 6.3.1 Developer Edition allows remote attackers to read arbitrary files via a /.\../\../\ sequence in a path.

 
2011-01-20
 
CVE-2011-0497

CWE-22
 

 
Directory traversal vulnerability in Sybase EAServer 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to read arbitrary files via "../\" (dot dot forward-slash backslash) sequences in a crafted request.

 
 
CVE-2011-0496

CWE-noinfo
 

 
Unspecified vulnerability in Sybase EAServer 5.x and 6.x before 6.3 ESD#2, as used in Appeon, Replication Server Messaging Edition (RSME), and WorkSpace, allows remote attackers to install arbitrary web services and execute arbitrary code, related to a "design vulnerability."

 
2006-05-22
 
CVE-2006-2539

 

 
Sybase EAServer 5.0 for HP-UX Itanium, 5.2 for IBM AIX, HP-UX PA-RISC, Linux x86, and Sun Solaris SPARC, and 5.3 for Sun Solaris SPARC does not properly protect passwords when they are being entered via the GUI, which allows local users to obtain the cleartext passwords via the getSelectedText function in javax.swing.JPasswordField component.

 
2006-04-19
 
CVE-2006-1829

 

 
EAServer Manager in Sybase EAServer 5.2 and 5.3 allows remote authenticated users, possibly guests, to obtain password credentials of arbitrary users via unspecified vectors involving (1) connection caches, (2) open password prompts, and (3) stored custom connection profiles.

 
2005-07-19
 
CVE-2005-2297

 

 
Stack-based buffer overflow in TreeAction.do in Sybase EAServer 4.2.5 through 5.2 allows remote authenticated users to execute arbitrary code via a large javascript parameter.

 
2002-12-31
 
CVE-2002-1861

 

 
Sybase Enterprise Application Server 4.0, when running on Windows, allows remote attackers to retrieve files in the WEB-INF directory, which contains Java class files and configuration information, via a request to the WEB-INF directory with a trailing dot ("WEB-INF.").

 

 >>> Vendor: Sybase 14 Products
Powerdynamo
Adaptive server anywhere
Easerver
Adaptive server
Adaptive server enterprise
Pylon anywhere
Financial fusion consumer banking solution
Mobilink
Sql anywhere
Appeon for powerbuilder
Replication server
Sybase workspace
Onebridge mobile data suite
M-business anywhere


Copyright 2024, cxsecurity.com

 

Back to Top