Language:
http://www.nessus.org/u?7f77229a
http://www.nessus.org/u?0df99016
http://www.nessus.org/u?5e473d4b
http://www.nessus.org/u?b42ecf18
Severity: Medium
ID: 202021
File Name: joomla_512.nasl
Version: 1.5
Type: remote
Family: CGI abuses
Published: 7/9/2024
Updated: 8/23/2024
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Low
Score: 3.0
Risk Factor: Medium
Base Score: 6.4
Temporal Score: 4.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS Score Source: CVE-2024-26279
Risk Factor: Medium
Base Score: 6.1
Temporal Score: 5.3
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/a:joomla:joomla%5c%21
Required KB Items: www/PHP, Settings/ParanoidReport, installed_sw/Joomla!
Exploit Ease: No known exploits are available
Patch Publication Date: 7/9/2024
Vulnerability Publication Date: 7/9/2024
CVE: CVE-2024-21729, CVE-2024-21730, CVE-2024-21731, CVE-2024-26278, CVE-2024-26279
IAVA: 2024-A-0384-S