{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T14:57:14.345","vulnerabilities":[{"cve":{"id":"CVE-2013-6864","sourceIdentifier":"cve@mitre.org","published":"2013-11-23T18:55:05.077","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 before 15.0.3 ESD#4.3, 15.5 before 15.5 ESD#5.3, and 15.7 before 15.7 SP50 or 15.7 SP100 allows remote authenticated users to affect confidentiality, integrity, and availability via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de salto de directorio en SAP Sybase Adaptive Server Enterprise (ASE) 15.0.3 anteriores a 15.0.3 ESD#4.3, 15.5 anteriores a 15.5 ESD#5.3, y 15.7 anteriores a 15.7 SP50 o 15.7 SP100 permite a usuarios autenticados remotamente afectar a la confidencialidad, integridad y disponibilidad a través de vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:S/C:C/I:P/A:P","baseScore":6.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":8.5,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sybase:adaptive_server_enterprise:15.0.3:*:*:*:*:*:*:*","matchCriteriaId":"57082473-B410-4A53-9C84-E8C68E1B4558"},{"vulnerable":true,"criteria":"cpe:2.3:a:sybase:adaptive_server_enterprise:15.5:*:*:*:*:*:*:*","matchCriteriaId":"8EAE24F9-2904-472E-99C2-40DC465CD2D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:sybase:adaptive_server_enterprise:15.7:*:*:*:*:*:*:*","matchCriteriaId":"92352505-D953-4375-ACF0-F83DF5A418C9"}]}]}],"references":[{"url":"http://scn.sap.com/docs/DOC-8218","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/55537","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.sybase.com/detail?id=1099371","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://service.sap.com/sap/support/notes/1893556","source":"cve@mitre.org"},{"url":"http://scn.sap.com/docs/DOC-8218","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/55537","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.sybase.com/detail?id=1099371","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://service.sap.com/sap/support/notes/1893556","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}