Language:
http://php.net/ChangeLog-8.php#8.1.31
https://github.com/php/php-src/security/advisories/GHSA-5hqh-c84r-qjcv
https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2
https://github.com/php/php-src/security/advisories/GHSA-g665-fm4p-vhff
https://github.com/php/php-src/security/advisories/GHSA-h35g-vwh6-m678
https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43
Severity: Critical
ID: 211669
File Name: php_8_1_31.nasl
Version: 1.4
Type: remote
Family: CGI abuses
Published: 11/21/2024
Updated: 11/27/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.8
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2024-11236
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: cpe:/a:php:php
Required KB Items: www/PHP, installed_sw/PHP
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/21/2024
Vulnerability Publication Date: 11/21/2024
CVE: CVE-2024-11233, CVE-2024-11234, CVE-2024-11236, CVE-2024-8929, CVE-2024-8932
IAVA: 2024-A-0763