Language:
Severity: High
ID: 91101
File Name: wordpress_4_5_2.nasl
Version: 1.17
Type: remote
Family: CGI abuses
Published: 5/12/2016
Updated: 9/10/2024
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Critical
Score: 9.8
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2016-3714
Risk Factor: High
Base Score: 8.4
Temporal Score: 8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/a:wordpress:wordpress
Required KB Items: www/PHP, installed_sw/WordPress, Settings/ParanoidReport
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: No exploit is required
Patch Publication Date: 5/6/2016
Vulnerability Publication Date: 5/3/2016
CISA Known Exploited Vulnerability Due Dates: 5/3/2022, 9/30/2024
CVE: CVE-2016-3714, CVE-2016-3715, CVE-2016-3716, CVE-2016-3717, CVE-2016-3718, CVE-2016-4566, CVE-2016-4567
BID: 89848, 89849, 89852, 89861, 89866, 90300
CERT: 250519