Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2006-1951
Directory traversal vulnerability in SolarWinds TFTP Server 8.1 and earlier allows remote attackers to download arbitrary files via a crafted GET request including "....//" sequences, which are collapsed into "../" sequences by filtering.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.03
EPSS Ranking
86.1%
CVSS Severity
CVSS v2 Score
5.0
References
http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0009.html
http://secunia.com/advisories/19848
http://securityreason.com/securityalert/778
http://www.rapid7.com/advisories/R7-0019.html
http://www.securityfocus.com/archive/1/431729/100/0/threaded
http://www.securityfocus.com/bid/17648
http://www.vupen.com/english/advisories/2006/1561
https://exchange.xforce.ibmcloud.com/vulnerabilities/25969
http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0009.html
http://secunia.com/advisories/19848
http://securityreason.com/securityalert/778
http://www.rapid7.com/advisories/R7-0019.html
http://www.securityfocus.com/archive/1/431729/100/0/threaded
http://www.securityfocus.com/bid/17648
http://www.vupen.com/english/advisories/2006/1561
https://exchange.xforce.ibmcloud.com/vulnerabilities/25969
Products affected by CVE-2006-1951
Solarwinds
»
Tftp Server
»
Version:
5.0.55_standard
cpe:2.3:a:solarwinds:tftp_server:5.0.55_standard
Solarwinds
»
Tftp Server
»
Version:
5.0.60standard
cpe:2.3:a:solarwinds:tftp_server:5.0.60standard
Solarwinds
»
Tftp Server
»
Version:
8.1
cpe:2.3:a:solarwinds:tftp_server:8.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved