Vulnerability Details : CVE-2006-0232
Potential exploit
Symantec Scan Engine 5.0.0.24, and possibly other versions before 5.1.0.7, stores sensitive log and virus definition files under the web root with insufficient access control, which allows remote attackers to obtain the information via direct requests.
Products affected by CVE-2006-0232
- cpe:2.3:a:symantec:antivirus_scan_engine:5.0.0.24:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0232
0.53%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0232
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2006-0232
-
http://www.vupen.com/english/advisories/2006/1464
-
http://securitytracker.com/id?1015974
-
http://www.securityfocus.com/archive/1/431728/100/0/threaded
-
http://secunia.com/advisories/19734
-
http://securityreason.com/securityalert/759
-
http://www.symantec.com/avcenter/security/Content/2006.04.21.html
-
http://www.securityfocus.com/bid/17637
-
http://www.securityfocus.com/archive/1/431734/100/0/threaded
-
http://archives.neohapsis.com/archives/vulnwatch/2006-q2/0012.html
Exploit;Patch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25974
-
http://securityreason.com/securityalert/758
Jump to