语言:
严重性: Medium
ID: 306170
文件名: unpatched_CVE_2026_34477.nasl
版本: 1.2
类型: Local
代理: unix
系列: Misc.
发布时间: 2026/4/13
最近更新时间: 2026/4/14
支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
风险因素: Medium
分数: 4.0
风险因素: Medium
基本分数: 5.8
时间分数: 4.9
矢量: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSS 分数来源: CVE-2026-34477
风险因素: Medium
基本分数: 4.8
时间分数: 4.4
矢量: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
时间矢量: CVSS:3.0/E:U/RL:U/RC:C
风险因素: Medium
Base Score: 6.3
Threat Score: 1.7
Threat Vector: CVSS:4.0/E:U
Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N
CPE: cpe:/o:canonical:ubuntu_linux:20.04:-:lts, p-cpe:/a:centos:centos:pki-resteasy-servlet-initializer, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:redhat:enterprise_linux:pki-resteasy-client, p-cpe:/a:centos:centos:log4j, p-cpe:/a:centos:centos:pki-resteasy, p-cpe:/a:centos:centos:pki-resteasy-core, p-cpe:/a:centos:centos:resteasy-javadoc, p-cpe:/a:redhat:enterprise_linux:pki-resteasy-servlet-initializer, p-cpe:/a:centos:centos:log4j-slf4j, p-cpe:/a:redhat:enterprise_linux:resteasy-javadoc, cpe:/o:canonical:ubuntu_linux:25.10, p-cpe:/a:redhat:enterprise_linux:pki-resteasy-core, cpe:/o:redhat:enterprise_linux:9, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, p-cpe:/a:centos:centos:log4j-jcl, cpe:/o:centos:centos:8, p-cpe:/a:redhat:enterprise_linux:resteasy, p-cpe:/a:redhat:enterprise_linux:log4j-slf4j, p-cpe:/a:centos:centos:pki-resteasy-jackson2-provider, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:canonical:ubuntu_linux:apache-log4j2, p-cpe:/a:centos:centos:log4j-web, p-cpe:/a:centos:centos:pki-resteasy-client, p-cpe:/a:redhat:enterprise_linux:pki-resteasy, p-cpe:/a:redhat:enterprise_linux:log4j, p-cpe:/a:redhat:enterprise_linux:log4j-jcl, p-cpe:/a:redhat:enterprise_linux:pki-resteasy-jackson2-provider, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, p-cpe:/a:redhat:enterprise_linux:log4j-web, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:centos:centos:resteasy
必需的 KB 项: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier
易利用性: No known exploits are available
漏洞发布日期: 2026/4/10
CVE: CVE-2026-34477