Vulnerability Description
Directory traversal vulnerability in index.php in ViHor Design allows remote attackers to read arbitrary files via the page parameter.
CVSS Score
5.0
MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Vihor | Vihordesign | 1.0.6 |
References
- http://secunia.com/advisories/19403PatchVendor Advisory
- http://securityreason.com/securityalert/625
- http://www.attrition.org/pipermail/vim/2006-March/000650.html
- http://www.attrition.org/pipermail/vim/2006-March/000652.html
- http://www.securityfocus.com/archive/1/428737Exploit
- http://www.securityfocus.com/bid/17226Exploit
- http://www.securityfocus.com/bid/17227
- http://www.vupen.com/english/advisories/2006/1114
- http://secunia.com/advisories/19403PatchVendor Advisory
- http://securityreason.com/securityalert/625
- http://www.attrition.org/pipermail/vim/2006-March/000650.html
- http://www.attrition.org/pipermail/vim/2006-March/000652.html
- http://www.securityfocus.com/archive/1/428737Exploit
- http://www.securityfocus.com/bid/17226Exploit
- http://www.securityfocus.com/bid/17227
FAQ
What is CVE-2006-1497?
CVE-2006-1497 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Directory traversal vulnerability in index.php in ViHor Design allows remote attackers to read arbitrary files via the page parameter.
How severe is CVE-2006-1497?
CVE-2006-1497 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1497?
Check the references section above for vendor advisories and patch information. Affected products include: Vihor Vihordesign.