Plugins Pipeline

At Tenable, we use a multitude of approaches to deliver the best possible coverage to our customers and use a number of factors to prioritize vulnerabilities. Browse upcoming plugins that the Tenable Research team is prioritizing by CVE, detection status or keyword search. Please note that this page does not represent an exhaustive list of plugins that Tenable Research intends to provide coverage for nor for which plugin coverage is provided.

Plugins are categorized into one of the following detection statuses:

  • Development: Tenable Research team is actively working on providing a detection.
  • Testing: The plugin is in the production build & release pipeline.
  • Released: The plugin has been published on the displayed date.
TitleCVEsUpdatedStatus
Security Update for Exiv2CVE-2024-396957/26/2024development
Multiple Vulnerabilities in ISC BINDCVE-2024-1975, CVE-2024-0760, CVE-2024-4076, CVE-2024-17377/25/2024development
OSGeo GeoServer GeoTools Eval Injection Vulnerability (CVE-2024-36401)CVE-2024-364017/24/2024development
Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability (CVE-2024-34102)CVE-2024-341027/23/2024development
Security Update for Kubernetes Kubelet July 2024CVE-2024-53217/19/2024development
Security Update for IBM InfoSphere Information Server July 2024CVE-2024-406907/19/2024development
oracle CPUJul2024: Oracle PeopleSoft EnterpriseCVE-2024-26308, CVE-2024-0232, CVE-2024-21158, CVE-2024-21178, CVE-2023-48795, CVE-2024-21180, CVE-2023-42503, CVE-2024-21122, CVE-2023-28756, CVE-2024-211547/18/2024development
cisco cisco-sa-inode-static-key-VUVCeynn: Cisco Intelligent Node Software Static Key VulnerabilityCVE-2024-203237/18/2024development
cisco cisco-sa-esa-sma-wsa-xss-bgG5WHOD: Cisco Secure Email Gateway Cross-Site Scripting VulnerabilitiesCVE-2024-20258, CVE-2024-20392, CVE-2024-20401, CVE-2024-20256, CVE-2024-20257, CVE-2024-203837/18/2024development
cisco cisco-sa-esa-http-split-GLrnnOwS: Cisco Secure Email Gateway HTTP Response Splitting VulnerabilityCVE-2024-20258, CVE-2024-20392, CVE-2024-20401, CVE-2024-20256, CVE-2024-20257, CVE-2024-203837/18/2024development
cisco cisco-sa-esa-afw-bGG2UsjH: Cisco Secure Email Gateway Arbitrary File Write VulnerabilityCVE-2024-204017/18/2024development
oracle CPUJul2024: Java WindowsCVE-2024-21140, CVE-2024-21144, CVE-2024-21147, CVE-2024-21145, CVE-2024-21138, CVE-2024-27983, CVE-2024-211317/17/2024development
oracle CPUJul2024: Application Testing SuiteCVE-2023-487957/17/2024development
oracle CPUJul2024: MySQL Cluster 8.3.1CVE-2021-24112, CVE-2024-21142, CVE-2024-24549, CVE-2023-52426, CVE-2024-22257, CVE-2024-21166, CVE-2024-21185, CVE-2024-21179, CVE-2024-21176, CVE-2024-21157, CVE-2024-20996, CVE-2024-21130, CVE-2023-6129, CVE-2024-21129, CVE-2023-37920, CVE-2024-22262, CVE-2024-21165, CVE-2023-52425, CVE-2024-21163, CVE-2024-21135, CVE-2024-21173, CVE-2024-21177, CVE-2024-0450, CVE-2023-48795, CVE-2024-21137, CVE-2024-21134, CVE-2024-21125, CVE-2024-21127, CVE-2024-21171, CVE-2024-21170, CVE-2024-21159, CVE-2024-21160, CVE-2024-21162, CVE-2024-250627/17/2024development
oracle CPUJul2024: MySQL Cluster 8.1.1CVE-2021-24112, CVE-2024-21142, CVE-2024-24549, CVE-2024-22257, CVE-2024-21166, CVE-2024-21185, CVE-2024-21179, CVE-2024-21176, CVE-2024-21157, CVE-2024-20996, CVE-2024-21130, CVE-2023-6129, CVE-2024-21129, CVE-2023-37920, CVE-2024-22262, CVE-2024-21165, CVE-2023-52425, CVE-2024-21163, CVE-2024-21135, CVE-2024-21173, CVE-2024-21177, CVE-2024-0450, CVE-2023-48795, CVE-2024-21137, CVE-2024-21134, CVE-2024-21125, CVE-2024-21127, CVE-2024-21171, CVE-2024-21170, CVE-2024-21159, CVE-2024-21160, CVE-2024-21162, CVE-2024-250627/17/2024development
juniper JSA83018: JSA83018 : 2024-07 Security Bulletin: Junos OS and Junos OS Evolved: Receipt of specific PIM packet causes rpd crash when PIM is configured along with MoFRR (CVE-2024-39558)CVE-2024-395587/15/2024development
juniper JSA83018: 2024-07 Security Bulletin: Junos OS and Junos OS Evolved: Receipt of specific PIM packet causes rpd crash when PIM is configured along with MoFRR (CVE-2024-39558)CVE-2024-39523, CVE-2024-39522, CVE-2024-39559, CVE-2024-39513, CVE-2024-39535, CVE-2024-39553, CVE-2024-39521, CVE-2024-39529, CVE-2024-39539, CVE-2024-39558, CVE-2024-39540, CVE-2024-39538, CVE-2024-39548, CVE-2024-39518, CVE-2024-39552, CVE-2024-39537, CVE-2024-39532, CVE-2024-39524, CVE-2024-39511, CVE-2024-21586, CVE-2024-39560, CVE-2024-39512, CVE-2024-39520, CVE-2024-39557, CVE-2024-395337/15/2024development
juniper JSA82988: 2024-07 Security Bulletin: Junos OS: SRX Series: If DNS traceoptions are configured in a DGA or tunnel detection scenario specific DNS traffic leads to a PFE crash (CVE-2024-39529)CVE-2024-39523, CVE-2024-39522, CVE-2024-39559, CVE-2024-39513, CVE-2024-39535, CVE-2024-39553, CVE-2024-39521, CVE-2024-39529, CVE-2024-39539, CVE-2024-39558, CVE-2024-39540, CVE-2024-39538, CVE-2024-39548, CVE-2024-39518, CVE-2024-39552, CVE-2024-39537, CVE-2024-39532, CVE-2024-39524, CVE-2024-39511, CVE-2024-21586, CVE-2024-39560, CVE-2024-39512, CVE-2024-39520, CVE-2024-39557, CVE-2024-395337/15/2024development
juniper JSA82988: JSA82988 : 2024-07 Security Bulletin: Junos OS: SRX Series: If DNS traceoptions are configured in a DGA or tunnel detection scenario specific DNS traffic leads to a PFE crash (CVE-20CVE-2024-39523, CVE-2024-39522, CVE-2024-39559, CVE-2024-39513, CVE-2024-39535, CVE-2024-39553, CVE-2024-39521, CVE-2024-39529, CVE-2024-39539, CVE-2024-39558, CVE-2024-39540, CVE-2024-39538, CVE-2024-39548, CVE-2024-39518, CVE-2024-39552, CVE-2024-39537, CVE-2024-39532, CVE-2024-39524, CVE-2024-39511, CVE-2024-21586, CVE-2024-39560, CVE-2024-39512, CVE-2024-39520, CVE-2024-39557, CVE-2024-395337/15/2024development