VYPR
Unrated severityNVD Advisory· Published Aug 14, 2006· Updated Apr 16, 2026

CVE-2006-4140

CVE-2006-4140

Description

Directory traversal vulnerability in IPCheck Server Monitor before 5.3.3.639/640 allows remote attackers to read arbitrary files via modified .. (dot dot) sequences in the URL, including (1) "..%2f" (encoded "/" slash), "..../" (multiple dot), and "..%255c../" (double-encoded "\" backslash).

Affected products

35
  • cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*+ 34 more
    • cpe:2.3:a:ipcheck:server_monitor:4.3.1.368:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:4.3.1.382:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:4.4.1.521:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:4.4.1.522:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.0.1.272:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.0.1.299:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.0.1.309:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.0.1.321:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.1.0.341:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.1.0.342:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.1.0.345:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.2.0.404:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.2.0.405:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.2.0.418:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.2.0.420:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.2.2.449:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.2.2.451:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.0.506:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.0.507:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.0.508:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.0.509:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.1.574:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.1.575:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.1.578:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.1.579:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.1.580:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.1.581:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.1.586:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.1.587:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.2.605:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.2.606:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.2.609:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.2.610:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.2.616:*:*:*:*:*:*:*
    • cpe:2.3:a:ipcheck:server_monitor:5.3.2.617:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.