{"api_version":"1","generated_at":"2026-05-13T15:18:06+00:00","cve":"CVE-2006-0212","urls":{"html":"https://cve.report/CVE-2006-0212","api":"https://cve.report/api/cve/CVE-2006-0212.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-0212","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-0212"},"summary":{"title":"CVE-2006-0212","description":"Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-01-14 01:03:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}}],"references":[{"url":"http://secunia.com/advisories/18437","name":"http://secunia.com/advisories/18437","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Toshiba Bluetooth Stack File Upload Directory Traversal - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2","name":"http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Driver Information","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.osvdb.org/22380","name":"http://www.osvdb.org/22380","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.securityfocus.com/archive/1/421993/100/0/threaded","name":"http://www.securityfocus.com/archive/1/421993/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/16236","name":"http://www.securityfocus.com/bid/16236","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Toshiba Bluetooth Stack Object Push Service File Upload Directory Traversal Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2006/0184","name":"http://www.vupen.com/english/advisories/2006/0184","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=full-disclosure&m=113712413907526&w=2","name":"http://marc.info/?l=full-disclosure&m=113712413907526&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'[Full-disclosure] DMA[2006-0112a] - 'Toshiba Bluetooth Stack' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1015486","name":"http://securitytracker.com/id?1015486","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Toshiba Bluetooth Stack Input Validation Holes Permit Directory Traversal Attacks","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt","name":"http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-0212","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-0212","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.00.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.00.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.00.31a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.00.32","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.01.03","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.10.00","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.20.00","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.20.01","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.20.02","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"3.20.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"4.00.01t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"4.00.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"212","vulnerable":"1","versionEndIncluding":"4.00.23t","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"toshiba","cpe5":"bluetooth_stack","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T16:25:34.002Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20060113 DMA[2006-0112a] - 'Toshiba Bluetooth Stack Directory Transversal'","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/421993/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"},{"name":"16236","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/16236"},{"name":"ADV-2006-0184","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/0184"},{"name":"18437","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/18437"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"},{"name":"22380","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/22380"},{"name":"20060113 DMA[2006-0112a] - 'Toshiba Bluetooth Stack Directory Transversal'","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://marc.info/?l=full-disclosure&m=113712413907526&w=2"},{"name":"1015486","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1015486"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-01-12T00:00:00.000Z","descriptions":[{"lang":"en","value":"Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"20060113 DMA[2006-0112a] - 'Toshiba Bluetooth Stack Directory Transversal'","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/421993/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"},{"name":"16236","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/16236"},{"name":"ADV-2006-0184","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/0184"},{"name":"18437","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/18437"},{"tags":["x_refsource_MISC"],"url":"http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"},{"name":"22380","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/22380"},{"name":"20060113 DMA[2006-0112a] - 'Toshiba Bluetooth Stack Directory Transversal'","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://marc.info/?l=full-disclosure&m=113712413907526&w=2"},{"name":"1015486","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1015486"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-0212","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20060113 DMA[2006-0112a] - 'Toshiba Bluetooth Stack Directory Transversal'","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/421993/100/0/threaded"},{"name":"http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2","refsource":"MISC","url":"http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2"},{"name":"16236","refsource":"BID","url":"http://www.securityfocus.com/bid/16236"},{"name":"ADV-2006-0184","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/0184"},{"name":"18437","refsource":"SECUNIA","url":"http://secunia.com/advisories/18437"},{"name":"http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt","refsource":"MISC","url":"http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt"},{"name":"22380","refsource":"OSVDB","url":"http://www.osvdb.org/22380"},{"name":"20060113 DMA[2006-0112a] - 'Toshiba Bluetooth Stack Directory Transversal'","refsource":"FULLDISC","url":"http://marc.info/?l=full-disclosure&m=113712413907526&w=2"},{"name":"1015486","refsource":"SECTRACK","url":"http://securitytracker.com/id?1015486"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-0212","datePublished":"2006-01-14T01:00:00.000Z","dateReserved":"2006-01-14T00:00:00.000Z","dateUpdated":"2024-08-07T16:25:34.002Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-01-14 01:03:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:*:*:*:*:*:*:*:*","versionEndIncluding":"4.00.23t","matchCriteriaId":"31A7DCAC-2DF7-4EB1-B321-A1A331F32ED8"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.00.11:*:*:*:*:*:*:*","matchCriteriaId":"E0A3CCBE-29F6-4833-9839-0CEAB0C33A2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.00.12:*:*:*:*:*:*:*","matchCriteriaId":"6FB969B2-F6B7-48C0-9B4D-EC9F92944CA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.00.31a:*:*:*:*:*:*:*","matchCriteriaId":"950ACF9E-0783-42E5-A804-18A9F26E038A"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.00.32:*:*:*:*:*:*:*","matchCriteriaId":"E8D00C96-6DA5-453F-A7E2-694E0B83D68E"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.01.03:*:*:*:*:*:*:*","matchCriteriaId":"9A2ACFAD-8406-4478-8D12-F4EC8684728C"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.10.00:*:*:*:*:*:*:*","matchCriteriaId":"6160E18A-DE9C-4D0A-A901-BC2BB1CE3F26"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.20.00:*:*:*:*:*:*:*","matchCriteriaId":"01049F3C-7EE1-4836-BF9C-C2CFE84A03D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.20.01:*:*:*:*:*:*:*","matchCriteriaId":"484C6E65-24BA-4D07-8BD1-71384E63F41D"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.20.02:*:*:*:*:*:*:*","matchCriteriaId":"083F6F9A-626B-4F7B-9804-3E97C0D8624F"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:3.20.04:*:*:*:*:*:*:*","matchCriteriaId":"F031926C-3138-4D5E-81F4-ED34C95367C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:4.00.01t:*:*:*:*:*:*:*","matchCriteriaId":"17E31608-3811-491C-9759-6F66D0B4C6E2"},{"vulnerable":true,"criteria":"cpe:2.3:a:toshiba:bluetooth_stack:4.00.11:*:*:*:*:*:*:*","matchCriteriaId":"611EB66B-01DA-43DE-8DFE-0D6F5AD0657A"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"212","Ordinal":"1","Title":"CVE-2006-0212","CVE":"CVE-2006-0212","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"212","Ordinal":"1","NoteData":"Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\\\ sequences in the RFILE argument of ussp-push.","Type":"Description","Title":"CVE-2006-0212"},{"CveYear":"2006","CveId":"212","Ordinal":"2","NoteData":"2006-01-13","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"212","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}