Language:
http://securityreason.com/achievement_securityalert/33
https://seclists.org/fulldisclosure/2006/Feb/473
http://www.postnuke.com/index.php?name=News&file=article&sid=2754
Severity: Medium
ID: 20969
File Name: postnuke_0_762.nasl
Version: 1.21
Type: remote
Family: CGI abuses
Published: 2/22/2006
Updated: 4/11/2022
Configuration: Enable thorough checks
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.6
Risk Factor: Medium
Base Score: 5.1
Temporal Score: 4
Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P
CPE: cpe:/a:postnuke_software_foundation:postnuke
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
CVE: CVE-2006-0800, CVE-2006-0801, CVE-2006-0802
BID: 16752