https://security.gd-linux.com/notice/NS-SA-2023-0082
https://security.gd-linux.com/info/CVE-2021-45960
https://security.gd-linux.com/info/CVE-2021-46143
https://security.gd-linux.com/info/CVE-2022-22822
https://security.gd-linux.com/info/CVE-2022-22823
https://security.gd-linux.com/info/CVE-2022-22824
https://security.gd-linux.com/info/CVE-2022-22825
https://security.gd-linux.com/info/CVE-2022-22826
https://security.gd-linux.com/info/CVE-2022-22827
https://security.gd-linux.com/info/CVE-2022-23852
https://security.gd-linux.com/info/CVE-2022-25235
https://security.gd-linux.com/info/CVE-2022-25236
Severity: Critical
ID: 187329
File Name: newstart_cgsl_NS-SA-2023-0082_expat.nasl
Version: 1.0
Type: local
Published: 12/27/2023
Updated: 12/27/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 9
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2021-45960
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CVSS Score Source: CVE-2022-25315
CPE: p-cpe:/a:zte:cgsl_main:expat, p-cpe:/a:zte:cgsl_main:expat-devel, cpe:/o:zte:cgsl_main:6
Required KB Items: Host/local_checks_enabled, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/30/2023
Vulnerability Publication Date: 1/1/2022
CVE: CVE-2021-45960, CVE-2021-46143, CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-23852, CVE-2022-25235, CVE-2022-25236, CVE-2022-25315, CVE-2022-40674