Vulnerability Details : CVE-2006-0232
Symantec Scan Engine 5.0.0.24, and possibly other versions before 5.1.0.7, stores sensitive log and virus definition files under the web root with insufficient access control, which allows remote attackers to obtain the information via direct requests.
Exploit prediction scoring system (EPSS) score for CVE-2006-0232
Probability of exploitation activity in the next 30 days: 4.60%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 92 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-0232
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-0232
- http://www.vupen.com/english/advisories/2006/1464
- http://securitytracker.com/id?1015974
-
http://www.securityfocus.com/archive/1/431728/100/0/threaded
-
http://securityreason.com/securityalert/759
- http://www.symantec.com/avcenter/security/Content/2006.04.21.html
- http://www.securityfocus.com/bid/17637
- http://www.securityfocus.com/archive/1/431734/100/0/threaded
-
http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0012.html
Exploit;Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25974
-
http://securityreason.com/securityalert/758
Products affected by CVE-2006-0232
- cpe:2.3:a:symantec:antivirus_scan_engine:5.0.0.24:*:*:*:*:*:*:*