Severity: Critical
ID: 292410
File Name: miracle_linux_AXSA-2022-3871.nasl
Version: 1.1
Type: local
Published: 1/20/2026
Updated: 1/20/2026
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 8.1
Vendor Severity: Moderate
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.2
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2022-31813
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/o:miracle:linux:7, p-cpe:/a:miracle:linux:httpd24-httpd-manual, p-cpe:/a:miracle:linux:httpd24-mod_ssl, p-cpe:/a:miracle:linux:httpd24-httpd-tools, p-cpe:/a:miracle:linux:httpd24-mod_proxy_html, p-cpe:/a:miracle:linux:httpd24-httpd, p-cpe:/a:miracle:linux:httpd24-httpd-devel, p-cpe:/a:miracle:linux:httpd24-mod_ldap, p-cpe:/a:miracle:linux:httpd24-mod_session
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/MiracleLinux/release, Host/MiracleLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 9/29/2022
Vulnerability Publication Date: 6/3/2021
CISA Known Exploited Vulnerability Due Dates: 12/15/2021
CVE: CVE-2021-33193, CVE-2021-34798, CVE-2021-36160, CVE-2021-39275, CVE-2021-40438, CVE-2021-44224, CVE-2022-22719, CVE-2022-22721, CVE-2022-23943, CVE-2022-26377, CVE-2022-28614, CVE-2022-28615, CVE-2022-29404, CVE-2022-30522, CVE-2022-30556, CVE-2022-31813