Plugins Search

IDNameProductFamilyPublishedUpdatedSeverity
187596GitLab 12.0 < 14.10.5 / 15.0 < 15.0.4 / 15.1 < 15.1.1 (CVE-2022-2228)NessusCGI abuses1/3/20245/17/2024
medium
187598GitLab 10.7 < 15.1.5 / 15.2 < 15.2.3 / 15.3 < 15.3.1 (CVE-2022-2908)NessusCGI abuses1/3/20245/17/2024
medium
187601GitLab 13.7 < 14.1.7 / 14.2 < 14.2.5 / 14.3 < 14.3.1 (CVE-2021-39885)NessusCGI abuses1/3/20245/17/2024
medium
187676QNAP QTS / QuTS hero Vulnerability in QTS and QuTS hero (QSA-23-54)NessusMisc.1/8/20241/15/2024
high
187677QNAP QTS / QuTS hero Multiple Vulnerabilities in QTS and QuTS hero (QSA-23-27)NessusMisc.1/8/20241/11/2024
high
187971Cisco TelePresence Management Suite < 15.13.6 XSS (cisco-sa-tms-portal-xss-AXNeVg3s)NessusCISCO1/12/20244/25/2025
medium
188069Atlassian Confluence < 7.19.18 / 8.0.x < 8.5.5 / 8.6.x < 8.7.2 (CONFSERVER-94066)NessusCGI abuses1/16/20246/5/2024
high
189297Splunk Enterprise 9.0.0 < 9.0.8, 9.1.0 < 9.1.3 (SVD-2024-0108)NessusCGI abuses1/22/20244/26/2024
high
189298Splunk Enterprise 9.0.0 < 9.0.8, 9.1.0 < 9.1.3 (SVD-2024-0105)NessusCGI abuses1/22/20244/26/2024
medium
189374Juniper Junos OS Vulnerability (JSA75758)NessusJunos Local Security Checks1/23/20242/1/2024
medium
189531Cisco Unified Communications Manager RCE (cisco-sa-cucm-rce-bWNzQcUm)NessusCISCO1/25/20242/2/2024
critical
189533Cisco Unified Communications Manager IM & Presence RCE (cisco-sa-cucm-rce-bWNzQcUm)NessusCISCO1/25/20242/2/2024
critical
189592GitLab 12.7 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2023-6159)NessusCGI abuses1/25/20245/17/2024
medium
189593GitLab 14.0 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2024-0456)NessusCGI abuses1/25/20245/3/2024
medium
189594GitLab 16.0 < 16.5.8 / 16.6 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2024-0402)NessusCGI abuses1/25/20245/3/2024
critical
189596GitLab 13.7 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2023-5933)NessusCGI abuses1/25/20245/17/2024
medium
189764Cisco IOS XE Software Layer 2 Tunneling Protocol DoS (cisco-sa-ios-xe-l2tp-dos-eB5tuFmV)NessusCISCO1/30/20241/31/2024
high
190357QNAP QTS / QuTS hero Multiple Vulnerabilities in QTS, QuTS hero, and QuTScloud (QSA-24-02)NessusMisc.2/9/20242/12/2024
medium
190681QNAP QTS Vulnerability in QTS (QSA-24-01)NessusMisc.2/19/20242/19/2024
medium
190863GitLab 12.0 < 16.7.6 / 16.8 < 16.8.3 / 16.9 < 16.9.1 (CVE-2023-4895)NessusCGI abuses2/21/20245/17/2024
medium
190865GitLab 16.9.0 < 16.9.1 (CVE-2024-1451)NessusCGI abuses2/21/20245/3/2024
high
191465Cisco Nexus 3600 External BGP DoS (cisco-sa-nxos-po-acl-TkyePgvL)NessusCISCO3/1/20242/27/2025
high
191469Cisco NX-OS Software MPLS Encapsulated IPv6 DoS (cisco-sa-ipv6-mpls-dos-R9ycXkwM)NessusCISCO3/1/20242/27/2025
high
191554IBM WebSphere Application Server Liberty 17.0.0.3 < 24.0.0.3 (7125527)NessusWeb Servers3/5/20248/13/2025
medium
191555Atlassian Confluence 4.1.x < 7.19.17 / 8.0.x < 8.5.4 / 8.6.x < 8.6.2 / 8.7.x < 8.7.2 / 8.8.0 (CONFSERVER-94108)NessusCGI abuses3/5/20246/5/2024
high
192031Palo Alto Networks PAN-OS 9.0.x < 9.0.17-h4 / 9.1.x < 9.1.17 / 10.1.x < 10.1.12 / 10.2.x < 10.2.8 / 11.0.x < 11.0.3 VulnerabilityNessusPalo Alto Local Security Checks3/13/20242/2/2026
low
192108Cisco IOS XR Software Authenticated CLI SCP/SFTP DoS (cisco-sa-iosxr-scp-dos-kb6sUUHw)NessusCISCO3/14/20249/13/2024
medium
192465Cisco IOS XR Software SSH Privilege Escalation (cisco-sa-iosxr-ssh-privesc-eWDMKew3)NessusCISCO3/22/20249/13/2024
high
193424Apache 2.4.x < 2.4.54 Multiple Vulnerabilities (mod_lua)NessusWeb Servers4/17/20244/18/2024
high
193487Juniper Junos OS Vulnerability (JSA75757)NessusJunos Local Security Checks4/18/20244/18/2024
high
193490Juniper Junos OS Vulnerability (JSA75754)NessusJunos Local Security Checks4/18/202410/28/2024
medium
193491Juniper Junos OS Vulnerability (JSA75742)NessusJunos Local Security Checks4/18/20244/18/2024
medium
193492Juniper Junos OS Vulnerability (JSA75743)NessusJunos Local Security Checks4/18/20244/18/2024
high
193584Cisco IOS XE Software SNMP Extended Named Access Control List Bypass (cisco-sa-snmp-uwBXfqww)NessusCISCO4/19/20249/27/2024
medium
193953Splunk Enterprise 9.0.0 < 9.0.4 (SVD-2023-0202)NessusCGI abuses4/26/20244/26/2024
medium
194815GitLab 16.9 < 16.9.6 / 16.10 < 16.10.4 / 16.11 < 16.11.1 (CVE-2024-2434)NessusCGI abuses4/30/202412/13/2024
high
194816GitLab < 16.9.6 / 16.10 < 16.10.4 / 16.11 < 16.11.1 (CVE-2024-1347)NessusCGI abuses4/30/202412/13/2024
medium
194818GitLab 12.5 < 16.9.6 / 16.10 < 16.10.4 / 16.11 < 16.11.1 (CVE-2024-2829)NessusCGI abuses4/30/20245/31/2024
high
194909Atlassian Confluence < 7.19.20 / 7.20.x < 8.5.7 / 8.6.x < 8.9.0 (CONFSERVER-95099)NessusCGI abuses5/2/20246/5/2024
high
194924Splunk Enterprise 8.1 < 8.1.13, 8.2.0 < 8.2.10, 9.0.0 < 9.0.4 (SVD-2023-0215)NessusCGI abuses5/2/20245/2/2024
high
194925Splunk Enterprise 9.0.0 < 9.0.7, 9.1.0 < 9.1.2 (SVD-2023-1105)NessusCGI abuses5/2/20245/12/2025
high
194957GitLab 16.1 < 16.7.6 / 16.8 < 16.8.3 / 16.9 < 16.9.1 (CVE-2024-1525)NessusCGI abuses5/3/20245/3/2024
medium
197304GitLab 13.8 < 13.8.5 / 13.9 < 13.9.2 (CVE-2021-22185)NessusCGI abuses5/17/20245/17/2024
medium
197306GitLab 12.10 < 13.2.10 / 13.3 < 13.3.7 / 13.4 < 13.4.2 (CVE-2020-13339)NessusCGI abuses5/17/20245/17/2024
medium
197309GitLab 15.11 < 16.1.5 / 16.2 < 16.2.5 / 16.3 < 16.3.1 (CVE-2023-3210)NessusCGI abuses5/17/20245/17/2024
medium
197311GitLab 13.9 < 13.11.6 / 13.12 < 13.12.6 / 14.0 < 14.0.2 (CVE-2021-22226)NessusCGI abuses5/17/20245/17/2024
medium
197312GitLab < 15.1.6 (CVE-2022-3030)NessusCGI abuses5/17/20245/17/2024
medium
197313GitLab 11.3 < 14.1.7 / 14.2 < 14.2.5 / 14.3 < 14.3.1 (CVE-2021-39876)NessusCGI abuses5/17/20245/17/2024
medium
197315GitLab 8.4 < 13.0.12 / 13.1 < 13.1.6 / 13.2 < 13.2.3 (CVE-2020-13290)NessusCGI abuses5/17/20245/17/2024
high
197316GitLab 11.8 < 12.10.13 (CVE-2020-13336)NessusCGI abuses5/17/20245/17/2024
medium