Language:
http://www.nessus.org/u?7f77229a
http://www.nessus.org/u?0df99016
http://www.nessus.org/u?5e473d4b
http://www.nessus.org/u?b42ecf18
Severity: Medium
ID: 202021
File Name: joomla_512.nasl
Version: 1.3
Type: remote
Family: CGI abuses
Published: 7/9/2024
Updated: 7/12/2024
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Low
Score: 3.0
Risk Factor: Medium
Base Score: 4.3
Temporal Score: 3.2
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS Score Source: CVE-2024-26279
Risk Factor: Medium
Base Score: 6.1
Temporal Score: 5.3
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/a:joomla:joomla%5c%21
Required KB Items: installed_sw/Joomla!, www/PHP, Settings/ParanoidReport
Exploit Ease: No known exploits are available
Patch Publication Date: 7/9/2024
Vulnerability Publication Date: 7/9/2024
CVE: CVE-2024-21729, CVE-2024-21730, CVE-2024-21731, CVE-2024-26278, CVE-2024-26279
IAVA: 2024-A-0384