https://security.gd-linux.com/notice/NS-SA-2024-0015
https://security.gd-linux.com/info/CVE-2022-23521
https://security.gd-linux.com/info/CVE-2022-41903
Severity: Critical
ID: 193535
File Name: newstart_cgsl_NS-SA-2024-0015_git.nasl
Version: 1.0
Type: local
Published: 4/18/2024
Updated: 4/18/2024
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-41903
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:zte:cgsl_core:git-email, p-cpe:/a:zte:cgsl_core:git-svn, p-cpe:/a:zte:cgsl_main:git-gui, p-cpe:/a:zte:cgsl_main:git-all, p-cpe:/a:zte:cgsl_main:emacs-git, p-cpe:/a:zte:cgsl_main:perl-git, p-cpe:/a:zte:cgsl_main:git-email, p-cpe:/a:zte:cgsl_core:git-bzr, p-cpe:/a:zte:cgsl_core:git-hg, p-cpe:/a:zte:cgsl_core:git-daemon, p-cpe:/a:zte:cgsl_main:perl-git-svn, p-cpe:/a:zte:cgsl_main:git-svn, p-cpe:/a:zte:cgsl_core:git-cvs, p-cpe:/a:zte:cgsl_core:git, p-cpe:/a:zte:cgsl_main:git-bzr, p-cpe:/a:zte:cgsl_core:git-instaweb, p-cpe:/a:zte:cgsl_main:git-p4, p-cpe:/a:zte:cgsl_main:git, p-cpe:/a:zte:cgsl_core:git-all, p-cpe:/a:zte:cgsl_main:gitk, p-cpe:/a:zte:cgsl_core:emacs-git, p-cpe:/a:zte:cgsl_core:git-gnome-keyring, p-cpe:/a:zte:cgsl_main:emacs-git-el, p-cpe:/a:zte:cgsl_core:perl-git-svn, p-cpe:/a:zte:cgsl_core:git-gui, p-cpe:/a:zte:cgsl_main:git-debuginfo, p-cpe:/a:zte:cgsl_core:gitk, p-cpe:/a:zte:cgsl_main:git-daemon, p-cpe:/a:zte:cgsl_core:git-debuginfo, p-cpe:/a:zte:cgsl_core:git-p4, p-cpe:/a:zte:cgsl_core:perl-git, p-cpe:/a:zte:cgsl_main:git-instaweb, p-cpe:/a:zte:cgsl_core:gitweb, p-cpe:/a:zte:cgsl_core:emacs-git-el, cpe:/o:zte:cgsl_main:5, p-cpe:/a:zte:cgsl_main:git-gnome-keyring, cpe:/o:zte:cgsl_core:5, p-cpe:/a:zte:cgsl_main:git-hg, p-cpe:/a:zte:cgsl_main:gitweb, p-cpe:/a:zte:cgsl_main:git-cvs
Required KB Items: Host/local_checks_enabled, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list, Host/cpu
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/12/2024
Vulnerability Publication Date: 1/10/2023
CVE: CVE-2022-23521, CVE-2022-41903, CVE-2023-25652, CVE-2023-29007