Plugins Pipeline

At Tenable, we use a multitude of approaches to deliver the best possible coverage to our customers and use a number of factors to prioritize vulnerabilities. Browse upcoming plugins that the Tenable Research team is prioritizing by CVE, detection status or keyword search. Please note that this page does not represent an exhaustive list of plugins that Tenable Research intends to provide coverage for nor for which plugin coverage is provided.

Plugins are categorized into one of the following detection statuses:

  • Development: Tenable Research team is actively working on providing a detection.
  • Testing: The plugin is in the production build & release pipeline.
  • Released: The plugin has been published on the displayed date.
TitleCVEsUpdatedStatus
opensuse openSUSE-SU-2025-20148-1: openSUSE 16 : Security update for openexr (Important) (openSUSE-SU-2025-20148-1)CVE-2025-12840, CVE-2025-12495, CVE-2025-1283912/13/2025testing
oracle_linux ELSA-2025-23134: ELSA-2025-23134: mysql:8.0 security update (MODERATE)CVE-2025-53045, CVE-2025-53044, CVE-2025-53054, CVE-2025-53062, CVE-2025-53040, CVE-2025-53053, CVE-2025-53069, CVE-2025-5304212/13/2025testing
suse_linux SUSE-SU-2025:4386-1: SUSE SLES12 : Security update for postgresql16 (Important) (SUSE-SU-2025:4386-1)CVE-2025-12817, CVE-2025-1281812/13/2025development
suse_linux SUSE-SU-2025:4387-1: SUSE SLES15 : Security update for postgresql16 (Important) (SUSE-SU-2025:4387-1)CVE-2025-12817, CVE-2025-1281812/13/2025testing
suse_linux SUSE-SU-2025:4388-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for postgresql16 (Important) (SUSE-SU-2025:4388-1)CVE-2025-12817, CVE-2025-1281812/13/2025testing
suse_linux SUSE-SU-2025:4389-1: SUSE SLES15 / openSUSE 15 : Security update for python (Low) (SUSE-SU-2025:4389-1)CVE-2025-6075, CVE-2025-829112/13/2025testing
suse_linux SUSE-SU-2025:4373-1: SUSE SLES15 : Security update for container-suseconnect (Moderate) (SUSE-SU-2025:4373-1)12/13/2025testing
suse_linux SUSE-SU-2025:4380-1: SUSE SLES15 / openSUSE 15 : Security update for kubernetes-client (Important) (SUSE-SU-2025:4380-1)12/13/2025testing
opensuse openSUSE-SU-2025-20150-1: openSUSE 16 : Security update for binutils (Important) (openSUSE-SU-2025-20150-1)CVE-2025-11494, CVE-2025-1179, CVE-2025-11495, CVE-2025-11412, CVE-2025-1153, CVE-2025-11414, CVE-2025-8224, CVE-2025-1151, CVE-2025-1180, CVE-2025-1181, CVE-2025-1182, CVE-2025-1150, CVE-2025-5244, CVE-2025-7546, CVE-2025-8225, CVE-2025-3198, CVE-2025-11083, CVE-2025-1147, CVE-2025-1149, CVE-2025-0840, CVE-2025-5245, CVE-2025-1176, CVE-2025-1152, CVE-2025-7545, CVE-2025-1148, CVE-2025-1178, CVE-2025-1141312/13/2025testing
opensuse openSUSE-SU-2025-20153-1: openSUSE 16 : Security update for python-Django (Important) (openSUSE-SU-2025-20153-1)CVE-2025-64460, CVE-2025-13372, CVE-2025-6445912/13/2025testing
oracle_linux ELSA-2025-23109: ELSA-2025-23109: mysql security update (MODERATE)CVE-2025-53045, CVE-2025-53044, CVE-2025-53054, CVE-2025-53062, CVE-2025-53040, CVE-2025-53053, CVE-2025-53069, CVE-2025-5304212/13/2025testing
suse_linux SUSE-SU-2025:4384-1: SUSE SLES15 / openSUSE 15 : Security update for python-Django (Important) (SUSE-SU-2025:4384-1)CVE-2025-64460, CVE-2025-1337212/13/2025testing
suse_linux SUSE-SU-2025:4390-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for rhino (Moderate) (SUSE-SU-2025:4390-1)CVE-2025-6645312/13/2025testing
suse_linux SUSE-SU-2025:4383-1: SUSE SLES12 : Security update for libpng12 (Moderate) (SUSE-SU-2025:4383-1)CVE-2025-6450512/13/2025testing
suse_linux SUSE-SU-2025:4381-1: SUSE SLES15 / openSUSE 15 : Security update for kubernetes-client (Important) (SUSE-SU-2025:4381-1)12/13/2025testing
suse_linux SUSE-SU-2025:4382-1: SUSE SLES12 : Security update for gegl (Important) (SUSE-SU-2025:4382-1)CVE-2025-1092112/13/2025testing
[Web App Scanning] Gladinet CentreStack < 16.4.10315.56368 Insecure DeserializationCVE-2025-3040612/12/2025testing
[Web App Scanning] Gladinet Triofox < 16.7.10368.56560 Improper Access ControlCVE-2025-1248012/12/2025testing
apache_httpd 2.4.66.json: Fixed in Apache HTTP Server 2.4.66CVE-2025-65082, CVE-2025-55753, CVE-2025-58098, CVE-2025-59775, CVE-2025-6620012/11/2025development
oracle_linux ELSA-2025-28041: ELSA-2025-28041: openssl security update (MODERATE)CVE-2025-923012/10/2025development
oracle_linux ELSA-2025-22865: ELSA-2025-22865: kernel security update (MODERATE)CVE-2025-39925, CVE-2025-3997912/10/2025development
cisco cisco-sa-react-flight-TYw32Ddb: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025CVE-2025-5518212/5/2025development
Multiple Vulnerabilities in GoLang GoCVE-2025-61727, CVE-2025-6172912/4/2025development
fedora FEDORA-2025-6b2336ec55: openbao-2.4.4-1.fc42CVE-2025-64761, CVE-2025-5818312/3/2025development
fedora FEDORA-2025-c7f4367479: openbao-2.4.4-1.fc43CVE-2025-58185, CVE-2025-58189, CVE-2025-64761, CVE-2025-61723, CVE-2025-61725, CVE-2025-58188, CVE-2025-5818312/3/2025development
fedora FEDORA-2025-35fe65f08c: forgejo-13.0.3-1.fc4312/3/2025development
fedora FEDORA-2025-bb6c04e3ee: nextcloud-32.0.2-1.fc41CVE-2025-6450012/3/2025development
TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability (CVE-2025-9377)CVE-2025-937712/2/2025development
atlassian_confluence CONFSERVER-101479: Path Traversal Third-Party Dependency in Confluence Data Center and Server - CVE-2023-42282CVE-2025-4838711/20/2025development
atlassian_confluence CONFSERVER-101477: DoS (Denial of Service) Third-Party Dependency in Confluence Data Center and Server - CVE-2024-37890CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-4513311/20/2025development
atlassian_confluence CONFSERVER-101488: SSRF (Server-Side Request Forgery) Third-Party Dependency in Confluence Data Center and Server - CVE-2023-42282CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-4513311/20/2025development
atlassian_confluence CONFSERVER-101485: Improper Authorization Third-Party Dependency in Confluence Data Center and Server - CVE-2025-41248CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-4513311/20/2025development
atlassian_confluence CONFSERVER-101480: DoS (Denial of Service) Third-Party Dependency in Confluence Data Center and Server - CVE-2024-45296CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-4513311/20/2025development
atlassian_confluence CONFSERVER-101487: Prototype Pollution Third-Party Dependency in Confluence Data Center and Server - CVE-2022-46175CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-4513311/20/2025development
atlassian_confluence CONFSERVER-101486: DoS (Denial of Service) Third-Party Dependency in Confluence Data Center and Server - CVE-2023-42282CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-4513311/20/2025development
Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability (CVE-2025-61932)CVE-2025-6193211/18/2025development
Rapid7 Velociraptor Incorrect Default Permissions Vulnerability (CVE-2025-6264)CVE-2025-626411/17/2025development
Security Update for Intel Killer Performance SuiteCVE-2025-2449111/14/2025development
Security Update for Intel Distribution for Python SoftwareCVE-2025-3018211/14/2025development
cisco cisco-sa-cc-unauth-rce-QeN8h7mQ: Cisco Unified Contact Center Express Remote Code Execution VulnerabilitiesCVE-2025-20358, CVE-2025-2035411/12/2025development
Security Update for Dell iDRACCVE-2025-2239711/12/2025development
FA plugin updates for ubuntu_linux: 2025/11/06 12:19 chunk 1/1CVE-2025-64459, CVE-2025-6445811/7/2025development
redhat RHSA-2025:19512: RHSA-2025:19512: pcs security update (Important)CVE-2025-59830, CVE-2025-61772, CVE-2025-61771, CVE-2025-61919, CVE-2025-6177011/4/2025development
suse_linux SUSE-SU-2025:03606-1: SUSE openSUSE 15 : Security update for squid (Important) (SUSE-SU-2025:03606-1)CVE-2025-5936210/16/2025development
suse_linux SUSE-SU-2025:03600-1: SUSE openSUSE 15 : Security update for the Linux Kernel (Important) (SUSE-SU-2025:03600-1)CVE-2025-39833, CVE-2025-39675, CVE-2025-39783, CVE-2023-53181, CVE-2023-53215, CVE-2023-53343, CVE-2023-53456, CVE-2023-53177, CVE-2025-39925, CVE-2023-53395, CVE-2025-39844, CVE-2025-38622, CVE-2023-53379, CVE-2025-39763, CVE-2025-38706, CVE-2025-38725, CVE-2025-38735, CVE-2023-53247, CVE-2023-53325, CVE-2024-58240, CVE-2023-53263, CVE-2023-53264, CVE-2025-39824, CVE-2023-39197, CVE-2023-53444, CVE-2025-39782, CVE-2023-53303, CVE-2025-38713, CVE-2023-53432, CVE-2023-53462, CVE-2023-53446, CVE-2023-53206, CVE-2023-53394, CVE-2025-39860, CVE-2023-53336, CVE-2025-38593, CVE-2025-38721, CVE-2023-53357, CVE-2023-53520, CVE-2025-39923, CVE-2023-53257, CVE-2023-53179, CVE-2025-39889, CVE-2023-53217, CVE-2025-39800, CVE-2025-39849, CVE-2023-53369, CVE-2025-39709, CVE-2025-39677, CVE-2023-53350, CVE-2025-38488, CVE-2025-39710, CVE-2025-39853, CVE-2023-53323, CVE-2023-53500, CVE-2025-39726, CVE-2025-39738, CVE-2023-53316, CVE-2023-53374, CVE-2023-53448, CVE-2025-39806, CVE-2025-39907, CVE-2023-53421, CVE-2023-53180, CVE-2025-38692, CVE-2025-39857, CVE-2023-53480, CVE-2025-39827, CVE-2024-58090, CVE-2025-39714, CVE-2023-53238, CVE-2025-38724, CVE-2025-39787, CVE-2025-39850, CVE-2023-53420, CVE-2025-38456, CVE-2025-39685, CVE-2025-38605, CVE-2025-38694, CVE-2025-38685, CVE-2023-53312, CVE-2023-53333, CVE-2025-39770, CVE-2025-39797, CVE-2023-53183, CVE-2025-38574, CVE-2023-53492, CVE-2023-53360, CVE-2023-53457, CVE-2023-53488, CVE-2023-53510, CVE-2023-53505, CVE-2025-38597, CVE-2023-53501, CVE-2025-39869, CVE-2023-53479, CVE-2023-53518, CVE-2023-53516, CVE-2025-39751, CVE-2025-39694, CVE-2025-39825, CVE-2025-39742, CVE-2023-53461, CVE-2023-53371, CVE-2025-39871, CVE-2023-53196, CVE-2023-53441, CVE-2023-53331, CVE-2023-53207, CVE-2023-53436, CVE-2025-39810, CVE-2025-38679, CVE-2025-38640, CVE-2025-38616, CVE-2023-53367, CVE-2023-53490, CVE-2023-53485, CVE-2025-39686, CVE-2023-53205, CVE-2023-53365, CVE-2023-53167, CVE-2023-53377, CVE-2023-53311, CVE-2025-39847, CVE-2023-53245, CVE-2023-53339, CVE-2025-39790, CVE-2023-53255, CVE-2025-39739, CVE-2023-53319, CVE-2023-53291, CVE-2023-53280, CVE-2023-53472, CVE-2025-38643, CVE-2023-53230, CVE-2023-53147, CVE-2023-53248, CVE-2023-53491, CVE-2025-38698, CVE-2023-53527, CVE-2023-53260, CVE-2023-53201, CVE-2024-26584, CVE-2023-53496, CVE-2023-53304, CVE-2023-53314, CVE-2025-38695, CVE-2023-53235, CVE-2025-39750, CVE-2023-53426, CVE-2025-38584, CVE-2025-38639, CVE-2023-53185, CVE-2025-38732, CVE-2025-39730, CVE-2023-53275, CVE-2025-39705, CVE-2025-39691, CVE-2025-39891, CVE-2025-39679, CVE-2025-39682, CVE-2025-39861, CVE-2025-39724, CVE-2023-53321, CVE-2023-53391, CVE-2023-53528, CVE-2023-53292, CVE-2023-53454, CVE-2025-38660, CVE-2025-39864, CVE-2023-53189, CVE-2025-38263, CVE-2023-31248, CVE-2025-38702, CVE-2023-53368, CVE-2023-53451, CVE-2025-38693, CVE-2025-39773, CVE-2025-39832, CVE-2025-39920, CVE-2025-38730, CVE-2023-53530, CVE-2025-38623, CVE-2025-39693, CVE-2025-39764, CVE-2025-39798, CVE-2025-39823, CVE-2023-53220, CVE-2023-53463, CVE-2023-53354, CVE-2025-38255, CVE-2025-39845, CVE-2023-53226, CVE-2025-38514, CVE-2025-39865, CVE-2025-38691, CVE-2025-38701, CVE-2023-42753, CVE-2023-53438, CVE-2025-38527, CVE-2025-38676, CVE-2023-53165, CVE-2023-53192, CVE-2025-38351, CVE-2025-39835, CVE-2025-38645, CVE-2023-53187, CVE-2025-38736, CVE-2023-53322, CVE-2023-53425, CVE-2023-53370, CVE-2025-38687, CVE-2025-39684, CVE-2023-53447, CVE-2025-38668, CVE-2025-39706, CVE-2025-38614, CVE-2023-53249, CVE-2025-38664, CVE-2025-39732, CVE-2025-39718, CVE-2025-39703, CVE-2023-53175, CVE-2023-53386, CVE-2025-39808, CVE-2023-53364, CVE-2023-53151, CVE-2025-38680, CVE-2023-53342, CVE-2023-53174, CVE-2025-39701, CVE-2023-53495, CVE-2025-39746, CVE-2025-38419, CVE-2025-39882, CVE-2025-39848, CVE-2023-53287, CVE-2025-38466, CVE-2025-22022, CVE-2025-38727, CVE-2025-39713, CVE-2023-53274, CVE-2023-53523, CVE-2023-53507, CVE-2023-53487, CVE-2025-39744, CVE-2023-53204, CVE-2025-38119, CVE-2025-38659, CVE-2025-39761, CVE-2023-53328, CVE-2023-53508, CVE-2023-53222, CVE-2023-53515, CVE-2023-53401, CVE-2023-53305, CVE-2025-38678, CVE-2025-38526, CVE-2023-53324, CVE-2023-53195, CVE-2025-38418, CVE-2023-53221, CVE-2025-39839, CVE-2025-39826, CVE-2025-38590, CVE-2023-53184, CVE-2023-53252, CVE-2025-39838, CVE-2023-53531, CVE-2023-3772, CVE-2025-39719, CVE-2023-53150, CVE-2023-53210, CVE-2025-40300, CVE-2023-53286, CVE-2025-39846, CVE-2025-38408, CVE-2025-38681, CVE-2023-53385, CVE-2023-53258, CVE-2023-53209, CVE-2023-53504, CVE-2025-38734, CVE-2023-53313, CVE-2023-53251, CVE-2023-53465, CVE-2023-53208, CVE-2023-53352, CVE-2025-39721, CVE-2025-39842, CVE-2023-53152, CVE-2025-38556, CVE-2023-53442, CVE-2025-39801, CVE-2023-53261, CVE-2025-38544, CVE-2025-39678, CVE-2023-53309, CVE-2025-38402, CVE-2023-53384, CVE-2023-53424, CVE-2023-53397, CVE-2023-53288, CVE-2023-53356, CVE-2025-38465, CVE-2025-38697, CVE-2025-38683, CVE-2025-39681, CVE-2023-53380, CVE-2025-38715, CVE-2023-53362, CVE-2025-39758, CVE-2025-38234, CVE-2023-53243, CVE-2023-53519, CVE-2025-39757, CVE-2025-39870, CVE-2023-53493, CVE-2025-38705, CVE-2025-39754, CVE-2025-38722, CVE-2025-38684, CVE-2025-39854, CVE-2023-53429, CVE-2025-39766, CVE-2023-53428, CVE-2025-39772, CVE-2025-39749, CVE-2023-53170, CVE-2025-39863, CVE-2025-39885, CVE-2025-38729, CVE-2023-53272, CVE-2025-39759, CVE-2023-53231, CVE-2023-53526, CVE-2025-39873, CVE-2025-38533, CVE-2025-39743, CVE-2023-53338, CVE-2025-38712, CVE-2025-38709, CVE-2025-38714, CVE-2025-38595, CVE-2023-53148, CVE-2025-3976010/16/2025development
suse_linux SUSE-SU-2025:03599-1: SUSE openSUSE 15 : Security update for qt6-base (Moderate) (SUSE-SU-2025:03599-1)CVE-2025-5455, CVE-2025-3034810/16/2025development
redhat RHSA-2025:17776: RHSA-2025:17776: kernel security update (Moderate)CVE-2025-39757, CVE-2025-39761, CVE-2025-3855610/13/2025development
redhat RHSA-2025:17797: RHSA-2025:17797: kernel security update (Moderate)CVE-2022-50228, CVE-2023-5330510/13/2025development
redhat RHSA-2025:17733: RHSA-2025:17733: kernel security update (Important)CVE-2021-2255510/11/2025development
oracle_linux ELSA-2025-17377: ELSA-2025-17377: kernel security update (MODERATE)CVE-2025-38351, CVE-2024-50301, CVE-2025-3976110/8/2025development