Unrated severityNVD Advisory· Published Aug 14, 2006· Updated Apr 16, 2026
CVE-2006-4140
CVE-2006-4140
Description
Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) "..%2f" (encoded "/" slash), "..../" (multiple dot), and "..%255c../" (double-encoded "\" backslash).
Affected products
35cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*+ 34 more
- cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:4.3.1.382:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:4.4.1.521:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:4.4.1.522:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.0.1.272:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.0.1.299:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.0.1.309:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.0.1.321:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.1.0.341:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.1.0.342:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.1.0.345:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.0.404:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.0.405:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.0.418:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.0.420:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.2.449:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.2.2.451:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.0.506:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.0.507:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.0.508:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.0.509:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.574:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.575:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.578:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.579:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.580:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.581:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.586:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.1.587:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.605:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.606:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.609:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.610:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.616:*:*:*:*:*:*:*
- cpe:2.3:a:ipcheck:server_monitor:5.3.2.617:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- secunia.com/advisories/21468nvdExploitVendor Advisory
- securitytracker.com/idnvdExploit
- www.securityfocus.com/bid/19473nvdExploit
- securityreason.com/securityalert/1389nvd
- www.paessler.com/forum/viewtopic.phpnvd
- www.paessler.com/ipcheck/historynvd
- www.securityfocus.com/archive/1/442822/100/0/threadednvd
- www.securityfocus.com/archive/1/444227/100/0/threadednvd
- www.vupen.com/english/advisories/2006/3259nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/28341nvd
News mentions
0No linked articles in our index yet.