Language:
https://www.drupal.org/sa-core-2020-003
https://www.drupal.org/project/drupal/releases/7.70
https://www.drupal.org/sa-core-2020-002
http://www.nessus.org/u?f249edf4
https://en.wikipedia.org/wiki/Software_regression
http://www.nessus.org/u?07eeffa7
http://www.nessus.org/u?bc025732
https://html.spec.whatwg.org/multipage/custom-elements.html
https://jquery.com/upgrade-guide/3.5/#description-of-the-change
https://www.drupal.org/project/drupal/releases/8.7.14
https://www.drupal.org/project/drupal/releases/8.8.6
https://www.drupal.org/project/issues/drupal
Severity: Medium
ID: 136745
File Name: drupal_8_8_6.nasl
Version: 1.6
Type: remote
Family: CGI abuses
Published: 5/21/2020
Updated: 12/5/2022
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Risk Factor: Medium
Score: 5.7
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.4
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS Score Source: CVE-2020-11023
Risk Factor: Medium
Base Score: 6.1
Temporal Score: 5.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/a:drupal:drupal
Required KB Items: Settings/ParanoidReport, installed_sw/Drupal
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/20/2020
Vulnerability Publication Date: 4/29/2020
CVE: CVE-2020-11022, CVE-2020-11023
IAVB: 2020-B-0030