Plugins Pipeline

At Tenable, we use a multitude of approaches to deliver the best possible coverage to our customers and use a number of factors to prioritize vulnerabilities. Browse upcoming plugins that the Tenable Research team is prioritizing by CVE, detection status or keyword search. Please note that this page does not represent an exhaustive list of plugins that Tenable Research intends to provide coverage for nor for which plugin coverage is provided.

Plugins are categorized into one of the following detection statuses:

  • Development: Tenable Research team is actively working on providing a detection.
  • Testing: The plugin is in the production build & release pipeline.
  • Released: The plugin has been published on the displayed date.
TitleCVEsUpdatedStatus
opensuse openSUSE-SU-2026:20193-1: openSUSE 16 : Security update for orthanc, gdcm, orthanc-authorization, orthanc-dicomweb, orthanc-gdcm, orthanc-indexer, orthanc-mysql, orthanc-neuro, orthanc-postgresql, orthanc-python, orthanc-stl, orthanc-tcia, orthanc-wsi, python-pyorthanc (Important) (openSUSE-SU-2026:20193-1)CVE-2024-25569, CVE-2024-22373, CVE-2024-223912/12/2026development
opensuse openSUSE-SU-2026:20192-1: openSUSE 16 : Security update for tailscale (Important) (openSUSE-SU-2026:20192-1)CVE-2025-22869, CVE-2025-580582/12/2026development
opensuse openSUSE-SU-2026:20185-1: openSUSE 16 : Security update for cockpit-packages (Important) (openSUSE-SU-2026:20185-1)CVE-2025-134652/12/2026development
opensuse openSUSE-SU-2026:20186-1: openSUSE 16 : Security update for libsoup (Important) (openSUSE-SU-2026:20186-1)CVE-2026-1536, CVE-2026-17612/12/2026development
opensuse openSUSE-SU-2026:20191-1: openSUSE 16 : Security update for trivy (Important) (openSUSE-SU-2026:20191-1)CVE-2025-66564, CVE-2025-647022/12/2026development
suse_linux SUSE-SU-2026:0430-1: SUSE SLED15 / SLES15 : Security update for python-pyasn1 (Important) (SUSE-SU-2026:0430-1)CVE-2026-234902/12/2026development
suse_linux SUSE-SU-2026:0437-1: SUSE SLED15 / SLES15 : Security update for ImageMagick (Important) (SUSE-SU-2026:0437-1)CVE-2026-22770, CVE-2026-23876, CVE-2026-23952, CVE-2026-238742/12/2026development
suse_linux SUSE-SU-2026:0450-1: SUSE SLES15 : Security update for munge (Important) (SUSE-SU-2026:0450-1)CVE-2026-255062/12/2026development
suse_linux SUSE-SU-2026:0423-1: SUSE SLES15 / openSUSE 15 : Security update for python-brotlipy (Important) (SUSE-SU-2026:0423-1)2/12/2026development
suse_linux SUSE-SU-2026:0447-1: SUSE SLED15 / SLES15 : Security update for the Linux Kernel (Important) (SUSE-SU-2026:0447-1)CVE-2025-71120, CVE-2026-22997, CVE-2025-68820, CVE-2025-71149, CVE-2025-71111, CVE-2025-40238, CVE-2025-71098, CVE-2025-68285, CVE-2025-68773, CVE-2025-68349, CVE-2025-71095, CVE-2025-68188, CVE-2025-71081, CVE-2025-68798, CVE-2025-71088, CVE-2025-68775, CVE-2025-71087, CVE-2025-40363, CVE-2026-23005, CVE-2025-71147, CVE-2025-39813, CVE-2025-68783, CVE-2025-40261, CVE-2025-68363, CVE-2025-71154, CVE-2025-38243, CVE-2025-68178, CVE-2025-68789, CVE-2025-71114, CVE-2025-40136, CVE-2025-71084, CVE-2025-40350, CVE-2025-68241, CVE-2025-39836, CVE-2025-71131, CVE-2025-40328, CVE-2025-37751, CVE-2025-68770, CVE-2026-22985, CVE-2025-68771, CVE-2025-68245, CVE-2025-68776, CVE-2025-71097, CVE-2025-71086, CVE-2025-40257, CVE-2025-71079, CVE-2026-22999, CVE-2025-40097, CVE-2025-68815, CVE-2026-23000, CVE-2025-71082, CVE-2025-40142, CVE-2025-71112, CVE-2025-71138, CVE-2025-68802, CVE-2025-38539, CVE-2026-22990, CVE-2025-68337, CVE-2025-71085, CVE-2025-68728, CVE-2026-22991, CVE-2026-22992, CVE-2023-54013, CVE-2024-56721, CVE-2025-38379, CVE-2025-71077, CVE-2026-23011, CVE-2025-68727, CVE-2025-68256, CVE-2024-53070, CVE-2025-37813, CVE-2025-68227, CVE-2025-71157, CVE-2025-71163, CVE-2025-68261, CVE-2025-40259, CVE-2026-22976, CVE-2025-68797, CVE-2025-68171, CVE-2025-40106, CVE-2025-40181, CVE-2025-71132, CVE-2025-68795, CVE-2025-68301, CVE-2025-39829, CVE-2025-71094, CVE-2025-40264, CVE-2025-68174, CVE-2026-23001, CVE-2025-71066, CVE-2024-42103, CVE-2025-71089, CVE-2025-68813, CVE-2025-71143, CVE-2025-68804, CVE-2025-71100, CVE-2024-53149, CVE-2025-68320, CVE-2025-68800, CVE-2025-68768, CVE-2025-39913, CVE-2025-71083, CVE-2025-38322, CVE-2025-71064, CVE-2025-68801, CVE-2025-71101, CVE-2025-40355, CVE-2025-22047, CVE-2025-40166, CVE-2025-71108, CVE-2025-71145, CVE-2025-68215, CVE-2026-22984, CVE-2025-71096, CVE-2025-71076, CVE-2025-68819, CVE-2025-71135, CVE-2025-40177, CVE-2025-71116, CVE-2025-39689, CVE-2025-68325, CVE-2025-68777, CVE-2025-39880, CVE-2025-71123, CVE-2025-71093, CVE-2025-71119, CVE-2025-68366, CVE-2026-22977, CVE-2025-71137, CVE-2025-68254, CVE-2025-71136, CVE-2023-53714, CVE-2026-22978, CVE-2026-23006, CVE-2024-27005, CVE-2026-22996, CVE-2025-68808, CVE-2025-71091, CVE-2025-68297, CVE-2025-71156, CVE-2025-68764, CVE-2025-71078, CVE-2025-38209, CVE-2025-68814, CVE-2025-40254, CVE-2025-71118, CVE-2025-37744, CVE-2026-22988, CVE-2025-40202, CVE-2025-71080, CVE-2025-68379, CVE-2025-71130, CVE-2025-68367, CVE-2025-68733, CVE-2025-40132, CVE-2025-71099, CVE-2025-68327, CVE-2025-71141, CVE-2025-71142, CVE-2025-68200, CVE-2025-68816, CVE-2025-68365, CVE-2025-68725, CVE-2025-71162, CVE-2025-68372, CVE-2025-68284, CVE-2025-68788, CVE-2025-68803, CVE-2025-68296, CVE-2025-71133, CVE-2026-229932/12/2026development
suse_linux SUSE-SU-2026:0443-1: SUSE SLED15 / SLES15 : Security update for python-urllib3 (Moderate) (SUSE-SU-2026:0443-1)CVE-2025-66418, CVE-2026-21441, CVE-2025-664712/12/2026development
suse_linux SUSE-SU-2026:0434-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for gpg2 (Important) (SUSE-SU-2026:0434-1)CVE-2026-248822/12/2026development
suse_linux SUSE-SU-2026:0432-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for sqlite3 (Moderate) (SUSE-SU-2026:0432-1)CVE-2025-77092/12/2026development
suse_linux SUSE-SU-2026:0441-1: SUSE SLES12 : Security update for java-1_8_0-openjdk (Important) (SUSE-SU-2026:0441-1)CVE-2026-21945, CVE-2026-21933, CVE-2026-21925, CVE-2026-219322/12/2026development
suse_linux SUSE-SU-2026:0439-1: SUSE SLES15 / openSUSE 15 : Security update for apptainer (Important) (SUSE-SU-2026:0439-1)CVE-2025-22870, CVE-2025-65105, CVE-2025-27144, CVE-2025-8556, CVE-2025-47913, CVE-2025-58181, CVE-2025-47914, CVE-2024-45310, CVE-2025-22869, CVE-2025-228722/12/2026development
suse_linux SUSE-SU-2026:0440-1: SUSE SLES15 / openSUSE 15 : Security update for python-Django (Important) (SUSE-SU-2026:0440-1)CVE-2026-1287, CVE-2025-13473, CVE-2026-1285, CVE-2026-1207, CVE-2025-14550, CVE-2026-13122/12/2026development
suse_linux SUSE-SU-2026:0438-1: SUSE SLES15 / openSUSE 15 : Security update for ImageMagick (Important) (SUSE-SU-2026:0438-1)CVE-2026-22770, CVE-2026-23876, CVE-2026-23952, CVE-2026-238742/12/2026development
suse_linux SUSE-SU-2026:0424-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for python-wheel (Important) (SUSE-SU-2026:0424-1)CVE-2026-240492/12/2026development
suse_linux SUSE-SU-2026:0444-1: SUSE SLES15 / openSUSE 15 : Security update for uriparser (Moderate) (SUSE-SU-2026:0444-1)CVE-2025-678992/12/2026development
suse_linux SUSE-SU-2026:0448-1: SUSE SLES12 : Security update for munge (Important) (SUSE-SU-2026:0448-1)CVE-2026-255062/12/2026development
suse_linux SUSE-SU-2026:0449-1: SUSE SLED15 / SLES15 : Security update for freerdp2 (Important) (SUSE-SU-2026:0449-1)CVE-2026-22856, CVE-2026-22852, CVE-2026-22854, CVE-2026-23530, CVE-2026-23531, CVE-2026-23534, CVE-2026-22859, CVE-2026-235322/12/2026development
suse_linux SUSE-SU-2026:0433-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for xrdp (Important) (SUSE-SU-2026:0433-1)CVE-2025-686702/12/2026development
suse_linux SUSE-SU-2026:0436-1: SUSE SLES15 : Security update for qemu (Important) (SUSE-SU-2026:0436-1)CVE-2025-112342/12/2026development
suse_linux SUSE-SU-2026:0442-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for gimp (Important) (SUSE-SU-2026:0442-1)CVE-2026-07972/12/2026development
suse_linux SUSE-SU-2026:0422-1: SUSE SLES12 : Security update for avahi (Moderate) (SUSE-SU-2026:0422-1)CVE-2025-68468, CVE-2025-68471, CVE-2025-682762/12/2026development
suse_linux SUSE-SU-2026:0425-1: SUSE SLED15 / SLES15 : Security update for python313-wheel (Important) (SUSE-SU-2026:0425-1)CVE-2026-240492/12/2026development
suse_linux SUSE-SU-2026:0426-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for go1.24 (Critical) (SUSE-SU-2026:0426-1)CVE-2025-68121, CVE-2025-68119, CVE-2025-617322/12/2026development
suse_linux SUSE-SU-2026:0445-1: SUSE SLED15 / SLES15 : Security update for qemu (Moderate) (SUSE-SU-2026:0445-1)CVE-2026-06652/12/2026development
suse_linux SUSE-SU-2026:0427-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for go1.25 (Critical) (SUSE-SU-2026:0427-1)CVE-2025-68121, CVE-2025-617322/12/2026development
suse_linux SUSE-SU-2026:0431-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for libsoup (Important) (SUSE-SU-2026:0431-1)CVE-2026-1536, CVE-2026-17612/12/2026development
suse_linux SUSE-SU-2026:0435-1: SUSE SLES15 / openSUSE 15 : Security update for nodejs20 (Important) (SUSE-SU-2026:0435-1)CVE-2025-55132, CVE-2025-59465, CVE-2026-21637, CVE-2025-55131, CVE-2026-22036, CVE-2025-59466, CVE-2025-551302/12/2026development
redhat RHSA-2026:2573: RHSA-2026:2573: kernel security update (Moderate)CVE-2025-40322, CVE-2025-68301, CVE-2023-53673, CVE-2023-53833, CVE-2023-53192, CVE-2023-53751, CVE-2025-40251, CVE-2025-40304, CVE-2022-50673, CVE-2022-50865, CVE-2022-495032/12/2026testing
redhat RHSA-2026:2583: RHSA-2026:2583: kernel-rt security update (Moderate)CVE-2025-40322, CVE-2023-53673, CVE-2023-53833, CVE-2025-40258, CVE-2025-40096, CVE-2025-38051, CVE-2025-38022, CVE-2025-40251, CVE-2025-403042/12/2026testing
redhat RHSA-2026:2557: RHSA-2026:2557: kpatch-patch-4_18_0-477_107_1, kpatch-patch-4_18_0-477_120_1, kpatch-patch-4_18_0-477_81_1, kpatch-patch-4_18_0-477_89_1, and kpatch-patch-4_18_0-477_97_1 security update (Moderate)CVE-2025-682852/12/2026testing
redhat RHSA-2026:2558: RHSA-2026:2558: kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, kpatch-patch-4_18_0-372_158_1, and kpatch-patch-4_18_0-372_170_1 security update (Moderate)CVE-2025-682852/12/2026testing
redhat RHSA-2026:2560: RHSA-2026:2560: kernel security update (Moderate)CVE-2025-40322, CVE-2023-53673, CVE-2023-53833, CVE-2025-40258, CVE-2025-40096, CVE-2025-38051, CVE-2025-38022, CVE-2025-40251, CVE-2025-403042/12/2026testing
unity_linux UTSA-2026-005336: Unity Linux: binutils (UTSA-2026-005336)CVE-2025-114942/12/2026testing
unity_linux UTSA-2026-005350: Unity Linux: openssl (UTSA-2026-005350)CVE-2025-694212/12/2026testing
unity_linux UTSA-2026-005337: Unity Linux: httpd (UTSA-2026-005337)CVE-2025-662002/12/2026testing
unity_linux UTSA-2026-005344: Unity Linux: postgresql-13 (UTSA-2026-005344)CVE-2025-87142/12/2026testing
unity_linux UTSA-2026-005340: Unity Linux: httpd (UTSA-2026-005340)CVE-2025-650822/12/2026testing
unity_linux UTSA-2026-005347: Unity Linux: redis (UTSA-2026-005347)CVE-2025-468172/12/2026testing
fedora FEDORA-2026-ef7170c9f6: gnutls-3.8.12-1.fc43CVE-2025-14831, CVE-2026-15842/12/2026testing
fedora FEDORA-2026-f1fabb2a49: p11-kit-0.26.2-1.fc43CVE-2026-21002/12/2026testing
apple 126348: About the security content of macOS Tahoe 26.3CVE-2026-20673, CVE-2025-59375, CVE-2026-20605, CVE-2026-20650, CVE-2026-20608, CVE-2026-20619, CVE-2026-20669, CVE-2026-20630, CVE-2026-20681, CVE-2026-20700, CVE-2026-20628, CVE-2026-20629, CVE-2026-20654, CVE-2026-20653, CVE-2026-20658, CVE-2026-20627, CVE-2026-20617, CVE-2026-20652, CVE-2026-20636, CVE-2026-20606, CVE-2026-20680, CVE-2026-20675, CVE-2026-20676, CVE-2026-20648, CVE-2026-20603, CVE-2026-20656, CVE-2026-20644, CVE-2026-20671, CVE-2026-20620, CVE-2026-20601, CVE-2026-20609, CVE-2026-20615, CVE-2026-20624, CVE-2026-20610, CVE-2026-20618, CVE-2026-20635, CVE-2026-20667, CVE-2026-20649, CVE-2026-20666, CVE-2026-20660, CVE-2026-20602, CVE-2026-20641, CVE-2026-20646, CVE-2026-20677, CVE-2026-20647, CVE-2026-20611, CVE-2026-20621, CVE-2026-20623, CVE-2026-20616, CVE-2026-20614, CVE-2026-20634, CVE-2026-20626, CVE-2026-20662, CVE-2026-20625, CVE-2026-206122/12/2026testing
apple 126346: About the security content of iOS 26.3 and iPadOS 26.3CVE-2025-59375, CVE-2026-20650, CVE-2026-20655, CVE-2026-20608, CVE-2026-20700, CVE-2026-20628, CVE-2026-20653, CVE-2026-20627, CVE-2026-20617, CVE-2026-20661, CVE-2026-20652, CVE-2026-20636, CVE-2026-20606, CVE-2026-20680, CVE-2026-20675, CVE-2026-20676, CVE-2026-20678, CVE-2026-20682, CVE-2026-20645, CVE-2026-20644, CVE-2026-20671, CVE-2026-20609, CVE-2026-20615, CVE-2026-20635, CVE-2026-20667, CVE-2026-20638, CVE-2026-20649, CVE-2026-20640, CVE-2026-20660, CVE-2026-20641, CVE-2026-20642, CVE-2026-20663, CVE-2026-20677, CVE-2026-20611, CVE-2026-20621, CVE-2026-20674, CVE-2026-20634, CVE-2026-20626, CVE-2026-206542/12/2026testing
unity_linux UTSA-2026-005349: Unity Linux: postgresql-13 (UTSA-2026-005349)CVE-2025-10942/12/2026testing
unity_linux UTSA-2026-005334: Unity Linux: postgresql-13 (UTSA-2026-005334)CVE-2025-87152/12/2026testing
unity_linux UTSA-2026-005342: Unity Linux: openssl (UTSA-2026-005342)CVE-2025-694202/12/2026testing
redhat RHSA-2026:2513: RHSA-2026:2513: spice-client-win security update (Important)CVE-2026-0719, CVE-2026-17612/11/2026testing