Plugins Pipeline

At Tenable, we use a multitude of approaches to deliver the best possible coverage to our customers and use a number of factors to prioritize vulnerabilities. Browse upcoming plugins that the Tenable Research team is prioritizing by CVE, detection status or keyword search. Please note that this page does not represent an exhaustive list of plugins that Tenable Research intends to provide coverage for nor for which plugin coverage is provided.

Plugins are categorized into one of the following detection statuses:

  • Development: Tenable Research team is actively working on providing a detection.
  • Testing: The plugin is in the production build & release pipeline.
  • Released: The plugin has been published on the displayed date.
TitleCVEsUpdatedStatus
freebsd 291773e6-b5b2-11f0-8f61-b42e991fc52e: Firefox -- use-after-free in the GPU or browser processCVE-2025-1238010/31/2025testing
freebsd c4fb21e4-b579-11f0-871c-6805ca2fa271: powerdns-recursor -- cache pollutionCVE-2025-59024, CVE-2025-5902310/31/2025testing
suse_linux SUSE-SU-2025:3868-1: SUSE SLES12 : Security update for chrony (Moderate) (SUSE-SU-2025:3868-1)10/31/2025testing
suse_linux SUSE-SU-2025:3865-1: SUSE SLED15 / SLES15 : Security update for xorg-x11-server (Important) (SUSE-SU-2025:3865-1)CVE-2025-62230, CVE-2025-62229, CVE-2025-6223110/31/2025testing
suse_linux SUSE-SU-2025:3866-1: SUSE SLES15 : Security update for xorg-x11-server (Important) (SUSE-SU-2025:3866-1)CVE-2025-62230, CVE-2025-62229, CVE-2025-6223110/31/2025testing
suse_linux SUSE-SU-2025:3873-1: SUSE SLES15 : Security update for strongswan (Important) (SUSE-SU-2025:3873-1)CVE-2025-6229110/31/2025testing
suse_linux SUSE-SU-2025:3872-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for xorg-x11-server (Important) (SUSE-SU-2025:3872-1)CVE-2025-62230, CVE-2025-62229, CVE-2025-6223110/31/2025testing
suse_linux SUSE-SU-2025:3863-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for xwayland (Important) (SUSE-SU-2025:3863-1)CVE-2025-62230, CVE-2025-62229, CVE-2025-6223110/31/2025testing
suse_linux SUSE-SU-2025:3869-1: SUSE SLED15 / SLES15 : Security update for himmelblau (Low) (SUSE-SU-2025:3869-1)CVE-2025-5816010/31/2025testing
suse_linux SUSE-SU-2025:3875-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for libxslt (Important) (SUSE-SU-2025:3875-1)CVE-2025-10911, CVE-2025-1173110/31/2025testing
freebsd 7c09fcb7-b5d6-11f0-b3f7-a8a1599412c6: chromium -- multiple security fixesCVE-2025-12447, CVE-2025-12435, CVE-2025-12431, CVE-2025-12437, CVE-2025-12446, CVE-2025-12443, CVE-2025-12436, CVE-2025-12428, CVE-2025-12430, CVE-2025-12036, CVE-2025-12440, CVE-2025-12441, CVE-2025-12444, CVE-2025-12438, CVE-2025-12432, CVE-2025-12433, CVE-2025-12445, CVE-2025-12439, CVE-2025-12434, CVE-2025-1242910/31/2025testing
suse_linux SUSE-SU-2025:3867-1: SUSE SLED15 / SLES15 : Security update for ImageMagick (Moderate) (SUSE-SU-2025:3867-1)CVE-2025-6217110/31/2025testing
suse_linux SUSE-SU-2025:3864-1: SUSE SLED15 / SLES15 : Security update for xorg-x11-server (Important) (SUSE-SU-2025:3864-1)CVE-2025-62230, CVE-2025-62229, CVE-2025-6223110/31/2025testing
suse_linux SUSE-SU-2025:3874-1: SUSE SLED15 / SLES15 : Security update for xwayland (Important) (SUSE-SU-2025:3874-1)CVE-2025-62230, CVE-2025-62229, CVE-2025-6223110/31/2025testing
Security Update for OpenSSHCVE-2025-6198510/30/2025testing
Security Update for KeyCloakCVE-2025-1093910/30/2025development
Dassault Systèmes DELMIA Apriso Missing Authorization Vulnerability (CVE-2025-6205)CVE-2025-620510/30/2025development
Dassault Systèmes DELMIA Apriso Code Injection Vulnerability (CVE-2025-6204)CVE-2025-620410/30/2025development
Multiple Vulnerabilities in SambaCVE-2025-9640, CVE-2025-1023010/30/2025development
[Web App Scanning] Apache Tomcat Multiple VulnerabilitiesCVE-2025-55754, CVE-2025-5575210/28/2025testing
[Web App Scanning] Apache Tomcat Denial of ServiceCVE-2025-6179510/28/2025testing
[Web App Scanning] Squid < 7.2 Information DisclosureCVE-2025-6216810/28/2025testing
Multiple Vulnerabilities in Rockwell Automation FactoryTalk LinxCVE-2025-9067, CVE-2025-906810/23/2025development
splunk SVD-2025-0604: Third-Party Package Updates in Splunk Universal Forwarder - June 2025CVE-2025-58185, CVE-2025-58188, CVE-2025-58189, CVE-2025-58190, CVE-2025-61723, CVE-2025-61725, CVE-2025-58183, CVE-2024-53259, CVE-2025-58186, CVE-2025-47912, CVE-2025-61724, CVE-2024-45337, CVE-2025-58187, CVE-2024-45338, CVE-2025-47911, CVE-2025-22869, CVE-2024-28180, CVE-2025-2286810/23/2025development
splunk SVD-2025-0710: Third-Party Package Updates in Splunk Enterprise - July 2025CVE-2025-58189, CVE-2025-22868, CVE-2025-61725, CVE-2022-30187, CVE-2024-45337, CVE-2025-61723, CVE-2024-6345, CVE-2025-58186, CVE-2025-58185, CVE-2025-58190, CVE-2024-13176, CVE-2025-61724, CVE-2025-47911, CVE-2025-22869, CVE-2013-7489, CVE-2025-47912, CVE-2024-45338, CVE-2025-58188, CVE-2024-9143, CVE-2025-58183, CVE-2025-5818710/23/2025development
oracle CPUOct2025: Application Testing SuiteCVE-2025-4897610/22/2025development
oracle CPUOct2025: Business Intelligence Enterprise EditionCVE-2025-53049, CVE-2024-47554, CVE-2024-12797, CVE-2025-4897610/22/2025development
oracle CPUOct2025: BI PublisherCVE-2025-61754, CVE-2025-4879510/22/2025development
cisco cisco-sa-snort3-mime-vulns-tTL8PgVH_CVE-2025-20359: Multiple Cisco Products Snort 3 MIME Denial of Service VulnerabilitiesCVE-2025-20360, CVE-2025-2035910/21/2025development
cisco cisco-sa-snort3-mime-vulns-tTL8PgVH_CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service VulnerabilitiesCVE-2025-20360, CVE-2025-2035910/21/2025development
cisco cisco-sa-snort3-mime-vulns-tTL8PgVH_CVE-2025-20360: Multiple Cisco Products Snort 3 MIME Denial of Service VulnerabilitiesCVE-2025-20360, CVE-2025-2035910/21/2025development
cisco cisco-sa-snort3-mime-vulns-tTL8PgVH_CVE-2025-20359: Multiple Cisco Products Snort 3 MIME Denial of Service VulnerabilitiesCVE-2025-20360, CVE-2025-2035910/21/2025development
debian_linux dla-4335: Debian dla-4335 : firefox-esr - security updateCVE-2025-11711, CVE-2025-11714, CVE-2025-11710, CVE-2025-11709, CVE-2025-11715, CVE-2025-11712, CVE-2025-1170810/17/2025development
CIS Red Hat Enterprise Linux 10 Benchmark v1.0.110/16/2025development
suse_linux SUSE-SU-2025:03606-1: SUSE openSUSE 15 : Security update for squid (Important) (SUSE-SU-2025:03606-1)CVE-2025-5936210/16/2025development
suse_linux SUSE-SU-2025:03600-1: SUSE openSUSE 15 : Security update for the Linux Kernel (Important) (SUSE-SU-2025:03600-1)CVE-2025-39833, CVE-2025-39675, CVE-2025-39783, CVE-2023-53181, CVE-2023-53215, CVE-2023-53343, CVE-2023-53456, CVE-2023-53177, CVE-2025-39925, CVE-2023-53395, CVE-2025-39844, CVE-2025-38622, CVE-2023-53379, CVE-2025-39763, CVE-2025-38706, CVE-2025-38725, CVE-2025-38735, CVE-2023-53247, CVE-2023-53325, CVE-2024-58240, CVE-2023-53263, CVE-2023-53264, CVE-2025-39824, CVE-2023-39197, CVE-2023-53444, CVE-2025-39782, CVE-2023-53303, CVE-2025-38713, CVE-2023-53432, CVE-2023-53462, CVE-2023-53446, CVE-2023-53206, CVE-2023-53394, CVE-2025-39860, CVE-2023-53336, CVE-2025-38593, CVE-2025-38721, CVE-2023-53357, CVE-2023-53520, CVE-2025-39923, CVE-2023-53257, CVE-2023-53179, CVE-2025-39889, CVE-2023-53217, CVE-2025-39800, CVE-2025-39849, CVE-2023-53369, CVE-2025-39709, CVE-2025-39677, CVE-2023-53350, CVE-2025-38488, CVE-2025-39710, CVE-2025-39853, CVE-2023-53323, CVE-2023-53500, CVE-2025-39726, CVE-2025-39738, CVE-2023-53316, CVE-2023-53374, CVE-2023-53448, CVE-2025-39806, CVE-2025-39907, CVE-2023-53421, CVE-2023-53180, CVE-2025-38692, CVE-2025-39857, CVE-2023-53480, CVE-2025-39827, CVE-2024-58090, CVE-2025-39714, CVE-2023-53238, CVE-2025-38724, CVE-2025-39787, CVE-2025-39850, CVE-2023-53420, CVE-2025-38456, CVE-2025-39685, CVE-2025-38605, CVE-2025-38694, CVE-2025-38685, CVE-2023-53312, CVE-2023-53333, CVE-2025-39770, CVE-2025-39797, CVE-2023-53183, CVE-2025-38574, CVE-2023-53492, CVE-2023-53360, CVE-2023-53457, CVE-2023-53488, CVE-2023-53510, CVE-2023-53505, CVE-2025-38597, CVE-2023-53501, CVE-2025-39869, CVE-2023-53479, CVE-2023-53518, CVE-2023-53516, CVE-2025-39751, CVE-2025-39694, CVE-2025-39825, CVE-2025-39742, CVE-2023-53461, CVE-2023-53371, CVE-2025-39871, CVE-2023-53196, CVE-2023-53441, CVE-2023-53331, CVE-2023-53207, CVE-2023-53436, CVE-2025-39810, CVE-2025-38679, CVE-2025-38640, CVE-2025-38616, CVE-2023-53367, CVE-2023-53490, CVE-2023-53485, CVE-2025-39686, CVE-2023-53205, CVE-2023-53365, CVE-2023-53167, CVE-2023-53377, CVE-2023-53311, CVE-2025-39847, CVE-2023-53245, CVE-2023-53339, CVE-2025-39790, CVE-2023-53255, CVE-2025-39739, CVE-2023-53319, CVE-2023-53291, CVE-2023-53280, CVE-2023-53472, CVE-2025-38643, CVE-2023-53230, CVE-2023-53147, CVE-2023-53248, CVE-2023-53491, CVE-2025-38698, CVE-2023-53527, CVE-2023-53260, CVE-2023-53201, CVE-2024-26584, CVE-2023-53496, CVE-2023-53304, CVE-2023-53314, CVE-2025-38695, CVE-2023-53235, CVE-2025-39750, CVE-2023-53426, CVE-2025-38584, CVE-2025-38639, CVE-2023-53185, CVE-2025-38732, CVE-2025-39730, CVE-2023-53275, CVE-2025-39705, CVE-2025-39691, CVE-2025-39891, CVE-2025-39679, CVE-2025-39682, CVE-2025-39861, CVE-2025-39724, CVE-2023-53321, CVE-2023-53391, CVE-2023-53528, CVE-2023-53292, CVE-2023-53454, CVE-2025-38660, CVE-2025-39864, CVE-2023-53189, CVE-2025-38263, CVE-2023-31248, CVE-2025-38702, CVE-2023-53368, CVE-2023-53451, CVE-2025-38693, CVE-2025-39773, CVE-2025-39832, CVE-2025-39920, CVE-2025-38730, CVE-2023-53530, CVE-2025-38623, CVE-2025-39693, CVE-2025-39764, CVE-2025-39798, CVE-2025-39823, CVE-2023-53220, CVE-2023-53463, CVE-2023-53354, CVE-2025-38255, CVE-2025-39845, CVE-2023-53226, CVE-2025-38514, CVE-2025-39865, CVE-2025-38691, CVE-2025-38701, CVE-2023-42753, CVE-2023-53438, CVE-2025-38527, CVE-2025-38676, CVE-2023-53165, CVE-2023-53192, CVE-2025-38351, CVE-2025-39835, CVE-2025-38645, CVE-2023-53187, CVE-2025-38736, CVE-2023-53322, CVE-2023-53425, CVE-2023-53370, CVE-2025-38687, CVE-2025-39684, CVE-2023-53447, CVE-2025-38668, CVE-2025-39706, CVE-2025-38614, CVE-2023-53249, CVE-2025-38664, CVE-2025-39732, CVE-2025-39718, CVE-2025-39703, CVE-2023-53175, CVE-2023-53386, CVE-2025-39808, CVE-2023-53364, CVE-2023-53151, CVE-2025-38680, CVE-2023-53342, CVE-2023-53174, CVE-2025-39701, CVE-2023-53495, CVE-2025-39746, CVE-2025-38419, CVE-2025-39882, CVE-2025-39848, CVE-2023-53287, CVE-2025-38466, CVE-2025-22022, CVE-2025-38727, CVE-2025-39713, CVE-2023-53274, CVE-2023-53523, CVE-2023-53507, CVE-2023-53487, CVE-2025-39744, CVE-2023-53204, CVE-2025-38119, CVE-2025-38659, CVE-2025-39761, CVE-2023-53328, CVE-2023-53508, CVE-2023-53222, CVE-2023-53515, CVE-2023-53401, CVE-2023-53305, CVE-2025-38678, CVE-2025-38526, CVE-2023-53324, CVE-2023-53195, CVE-2025-38418, CVE-2023-53221, CVE-2025-39839, CVE-2025-39826, CVE-2025-38590, CVE-2023-53184, CVE-2023-53252, CVE-2025-39838, CVE-2023-53531, CVE-2023-3772, CVE-2025-39719, CVE-2023-53150, CVE-2023-53210, CVE-2025-40300, CVE-2023-53286, CVE-2025-39846, CVE-2025-38408, CVE-2025-38681, CVE-2023-53385, CVE-2023-53258, CVE-2023-53209, CVE-2023-53504, CVE-2025-38734, CVE-2023-53313, CVE-2023-53251, CVE-2023-53465, CVE-2023-53208, CVE-2023-53352, CVE-2025-39721, CVE-2025-39842, CVE-2023-53152, CVE-2025-38556, CVE-2023-53442, CVE-2025-39801, CVE-2023-53261, CVE-2025-38544, CVE-2025-39678, CVE-2023-53309, CVE-2025-38402, CVE-2023-53384, CVE-2023-53424, CVE-2023-53397, CVE-2023-53288, CVE-2023-53356, CVE-2025-38465, CVE-2025-38697, CVE-2025-38683, CVE-2025-39681, CVE-2023-53380, CVE-2025-38715, CVE-2023-53362, CVE-2025-39758, CVE-2025-38234, CVE-2023-53243, CVE-2023-53519, CVE-2025-39757, CVE-2025-39870, CVE-2023-53493, CVE-2025-38705, CVE-2025-39754, CVE-2025-38722, CVE-2025-38684, CVE-2025-39854, CVE-2023-53429, CVE-2025-39766, CVE-2023-53428, CVE-2025-39772, CVE-2025-39749, CVE-2023-53170, CVE-2025-39863, CVE-2025-39885, CVE-2025-38729, CVE-2023-53272, CVE-2025-39759, CVE-2023-53231, CVE-2023-53526, CVE-2025-39873, CVE-2025-38533, CVE-2025-39743, CVE-2023-53338, CVE-2025-38712, CVE-2025-38709, CVE-2025-38714, CVE-2025-38595, CVE-2023-53148, CVE-2025-3976010/16/2025development
suse_linux SUSE-SU-2025:03599-1: SUSE openSUSE 15 : Security update for qt6-base (Moderate) (SUSE-SU-2025:03599-1)CVE-2025-5455, CVE-2025-3034810/16/2025development
PT - Oct 25 - Microsoft Defender for Endpoint for LinuxCVE-2025-5949710/15/2025development
mozilla mfsa2025-85: Security Vulnerabilities fixed in Thunderbird 140.4CVE-2025-11711, CVE-2025-11714, CVE-2025-11713, CVE-2025-11710, CVE-2025-11709, CVE-2025-11715, CVE-2025-11712, CVE-2025-1170810/14/2025development
rocky_linux RLSA-2025:17802: RLSA-2025:17802: webkit2gtk3 security update (Important)CVE-2025-43368, CVE-2025-43356, CVE-2025-43342, CVE-2025-4327210/14/2025development
rocky_linux RLSA-2025:15018: RLSA-2025:15018: udisks2 security update (Important)CVE-2025-806710/14/2025development
juniper JSA103147: JSA103147 : 2025-10 Security Bulletin: Junos OS Evolved: PTX Series: When firewall filter rejects traffic these packets are erroneously sent to the RE (CVE-2025-59958)CVE-2025-59974, CVE-2025-59957, CVE-2025-59958, CVE-2025-59962, CVE-2025-60004, CVE-2025-11198, CVE-2025-59964, CVE-2025-60006, CVE-2025-52960, CVE-2025-52961, CVE-2025-60010, CVE-2025-59967, CVE-2025-5998010/14/2025development
redhat RHSA-2025:17776: RHSA-2025:17776: kernel security update (Moderate)CVE-2025-39757, CVE-2025-39761, CVE-2025-3855610/13/2025development
redhat RHSA-2025:17797: RHSA-2025:17797: kernel security update (Moderate)CVE-2022-50228, CVE-2023-5330510/13/2025development
redhat RHSA-2025:17733: RHSA-2025:17733: kernel security update (Important)CVE-2021-2255510/11/2025development
vendor_unpatched cve-2025-11495: Unpatched CVEs for Debian Linux (cve-2025-11495)CVE-2025-1149510/10/2025development
vendor_unpatched cve-2025-58188: Unpatched CVEs for Debian Linux (cve-2025-58188)CVE-2025-5818810/10/2025development
fill gaps & backfill cves into Liferay plugins10/8/2025development
oracle_linux ELSA-2025-17377: ELSA-2025-17377: kernel security update (MODERATE)CVE-2025-38351, CVE-2024-50301, CVE-2025-3976110/8/2025development
oracle_linux ELSA-2025-17429: ELSA-2025-17429: open-vm-tools security update (IMPORTANT)CVE-2025-4124410/8/2025development