Directory traversal vulnerability in SolarWinds TFTP Server 8.1 and earlier allows remote attackers to download arbitrary files via a crafted GET request including "....//" sequences, which are collapsed into "../" sequences by filtering.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0009.html - | |
References | () http://secunia.com/advisories/19848 - | |
References | () http://securityreason.com/securityalert/778 - | |
References | () http://www.rapid7.com/advisories/R7-0019.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/431729/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17648 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/1561 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25969 - |
Information
Published : 2006-04-24 23:02
Updated : 2024-11-21 00:10
NVD link : CVE-2006-1951
Mitre link : CVE-2006-1951
CVE.ORG link : CVE-2006-1951
JSON object : View
Products Affected
solarwinds
- tftp_server
CWE