Plugins Search

IDNameProductFamilyPublishedUpdatedSeverity
182228Atlassian JIRA SEoL (3.11.x)NessusMisc.9/29/20236/5/2024
critical
182238Tenable Nessus SEoL (10.0.x)NessusMisc.9/29/202311/2/2023
low
182243VMware Carbon Black App Control SEoL (<= 8.1.x)NessusMisc.9/29/202311/2/2023
low
182276Atlassian JIRA SEoL (3.3.x)NessusMisc.9/29/20236/5/2024
critical
182277Tenable Nessus SEoL (7.0.x)NessusMisc.9/29/202311/2/2023
critical
182282Atlassian JIRA SEoL (6.1.x)NessusMisc.9/29/20236/5/2024
critical
182286Atlassian JIRA SEoL (3.13.x)NessusMisc.9/29/20236/5/2024
critical
182300Atlassian JIRA SEoL (3.10.x)NessusMisc.9/29/20236/5/2024
critical
182321VMware Carbon Black App Control SEoL (8.7.x)NessusMisc.9/29/202311/2/2023
low
182336Atlassian JIRA SEoL (4.2.x)NessusMisc.9/29/20236/5/2024
critical
182348Tenable Nessus SEoL (10.1.x)NessusMisc.9/29/202311/2/2023
low
182356GitLab 15.3 < 16.2.8 / 16.3 < 16.3.5 / 16.4 < 16.4.1 (CVE-2023-4379)NessusCGI abuses9/29/20235/17/2024
high
182579Cisco Unified Communications Manager IM & Presence DoS (cisco-sa-cucm-imp-dos-49GL7rzT)NessusCISCO10/5/202310/6/2023
high
182580Cisco Unified Communications Manager SQLi (cisco-sa-cucm-injection-g6MbwH2)NessusCISCO10/5/202310/6/2023
high
182921Juniper Junos OS Vulnerability (JSA73164)NessusJunos Local Security Checks10/11/202310/23/2023
high
182934Juniper Junos OS Vulnerability (JSA73172)NessusJunos Local Security Checks10/11/202310/21/2023
high
183504Juniper Junos OS Vulnerability (JSA73150)NessusJunos Local Security Checks10/20/202311/26/2024
high
183964Tenable.ad < 3.29.4 / 3.19.12 / 3.11.9 Client Authentication Bypass (TNS-2022-27)NessusMisc.10/27/202310/23/2024
critical
184348SolarWinds Platform 2023.3.x < 2023.4 Multiple VulnerabilitiesNessusCGI abuses11/3/202312/29/2023
high
185161OpenSSL 3.1.0 < 3.1.5 Multiple VulnerabilitiesNessusWeb Servers11/7/202310/7/2024
medium
185903Splunk Enterprise 9.0.0 < 9.0.7, 9.1.0 < 9.1.2 (SVD-2023-1104)NessusCGI abuses11/16/20234/26/2024
high
186011Tenable Nessus < 10.5.7 (TNS-2023-39)NessusMisc.11/20/20236/13/2024
medium
186175Atlassian Confluence 7.13.x / 8.1.x / 8.2.x / 8.3.x / 8.6.0 < 8.6.1 (CONFSERVER-93169)NessusCGI abuses11/22/20236/5/2024
high
186218Atlassian Confluence 7.19.x < 7.19.16 (CONFSERVER-93168)NessusCGI abuses11/23/20236/5/2024
high
186537ManageEngine NetFlow Analyzer 12.5.x < 12.5.657 / 12.6.x < 12.6.002 / 12.6.104 / 12.6.118 Authenticate BypassNessusCGI abuses12/4/202310/23/2024
high
186651Atlassian Confluence 4.x < 7.19.17 / 7.20.x < 8.4.5 / 8.5.x < 8.5.4 / 8.6.x < 8.6.2 / 8.7.x < 8.7.1 (CONFSERVER-93502)NessusCGI abuses12/7/20236/5/2024
high
186655GitLab 13.2 < 16.4.3 / 16.5 < 16.5.3 / 16.6 < 16.6.1 (CVE-2023-3964)NessusCGI abuses12/7/20235/17/2024
medium
186659GitLab 16.5 < 16.5.3 / 16.6 < 16.6.1 (CVE-2023-6396)NessusCGI abuses12/7/202312/22/2023
high
186884GitLab 16.3 < 16.4.4 / 16.5 < 16.5.4 / 16.6 < 16.6.2 (CVE-2023-5512)NessusCGI abuses12/14/20235/17/2024
medium
186889Palo Alto Networks PAN-OS 8.1.x < 8.1.26 / 9.0.x < 9.0.17-h1 / 9.1.x < 9.1.14 VulnerabilityNessusPalo Alto Local Security Checks12/14/20234/11/2024
medium
186905Palo Alto Networks PAN-OS 8.1.x < 8.1.25 / 9.0.x < 9.0.17 / 9.1.x < 9.1.16 / 10.0.x < 10.0.12 / 10.1.x < 10.1.9 / 10.2.x < 10.2.4 / 11.0.x < 11.0.1 VulnerabilityNessusPalo Alto Local Security Checks12/14/20234/11/2024
medium
187054QNAP QTS / QuTS hero Vulnerabilities in Samba (QSA-23-20)NessusMisc.12/18/202312/20/2023
critical
187430GitLab 14.5 < 15.1.6 / 15.2 < 15.2.4 / 15.3 < 15.3.2 (CVE-2022-3331)NessusCGI abuses1/2/20245/17/2024
medium
187433GitLab 10.0 < 14.6.5 / 14.7 < 14.7.4 / 14.8 < 14.8.2 (CVE-2022-0751)NessusCGI abuses1/2/20245/17/2024
high
187441GitLab 7.10 < 13.12.9 / 14.0 < 14.0.7 / 14.1 < 14.1.2 (CVE-2021-22243)NessusCGI abuses1/2/20245/17/2024
medium
187450GitLab 13.11 < 14.1.7 / 14.2 < 14.2.5 / 14.3 < 14.3.1 (CVE-2021-39883)NessusCGI abuses1/2/20245/17/2024
medium
187451GitLab 13.0 < 14.3.6 / 14.4 < 14.4.4 / 14.5 < 14.5.2 (CVE-2021-39915)NessusCGI abuses1/2/20245/17/2024
medium
187459GitLab 8.10 < 14.5.4 / 14.6 < 14.6.4 / 14.7 < 14.7.1 (CVE-2022-0488)NessusCGI abuses1/2/20245/17/2024
medium
187462GitLab 12.0.0 < 14.9.5 / 14.10.0 < 14.10.4 / 15.0.0 < 15.0.1 (CVE-2022-1936)NessusCGI abuses1/2/20245/17/2024
medium
187469GitLab 12.9 < 13.8.7 / 13.9.0 < 13.9.5 / 13.10 < 13.10.1 (CVE-2021-22199)NessusCGI abuses1/2/20245/17/2024
medium
187501GitLab 0.0 < 14.3.6 / 14.4 < 14.4.4 / 14.5 < 14.5.2 (CVE-2021-39937)NessusCGI abuses1/3/20245/17/2024
high
187510GitLab 13.7 < 13.9.7 / 13.10 < 13.10.4 / 13.11 < 13.11.2 (CVE-2021-22211)NessusCGI abuses1/3/20245/17/2024
medium
187511GitLab 14.1 < 14.3.6 / 14.4 < 14.4.4 / 14.5 < 14.5.2 (CVE-2021-39916)NessusCGI abuses1/3/20245/17/2024
medium
187521GitLab 11.4 < 13.12.9 / 14.0 < 14.0.7 / 14.1 < 14.1.2 (CVE-2021-22242)NessusCGI abuses1/3/20245/17/2024
medium
187532GitLab 11.11 < 14.1.7 / 14.2 < 14.2.5 / 14.3 < 14.3.1 (CVE-2021-39870)NessusCGI abuses1/3/20245/17/2024
medium
187533GitLab < 15.6.7 (SECURITY-RELEASE-GITLAB-15-8-1-RELEASED)NessusCGI abuses1/3/20241/3/2024
high
187539GitLab 12.10 < 14.6.5 / 14.7 < 14.7.4 / 14.8 < 14.8.2 (CVE-2022-0735)NessusCGI abuses1/3/20245/17/2024
critical
187541GitLab < 13.12.9 (CVE-2021-22245)NessusCGI abuses1/3/20245/17/2024
low
187544GitLab 0.0 < 15.5.9 / 15.6 < 15.6.6 / 15.7 < 15.7.5 (CVE-2022-41903)NessusCGI abuses1/3/20241/3/2024
critical
187546GitLab 15.2 < 15.2.4 / 15.3 < 15.3.2 (CVE-2022-2630)NessusCGI abuses1/3/20245/17/2024
medium