Plugins Search

IDNameProductFamilyPublishedUpdatedSeverity
175554MariaDB 10.3.0 < 10.3.39NessusDatabases5/13/20237/17/2025
medium
185534MariaDB 11.0.0 < 11.0.4NessusDatabases11/14/20237/17/2025
medium
185541MariaDB 11.1.0 < 11.1.3NessusDatabases11/14/20237/17/2025
medium
185542MariaDB 10.4.0 < 10.4.32NessusDatabases11/14/20237/17/2025
medium
197194MariaDB 10.5.0 < 10.5.25NessusDatabases5/16/20247/17/2025
medium
197195MariaDB 11.0.0 < 11.0.6NessusDatabases5/16/20247/17/2025
medium
197196MariaDB 11.1.0 < 11.1.5NessusDatabases5/16/20247/17/2025
medium
197197MariaDB 10.11.0 < 10.11.8NessusDatabases5/16/20247/17/2025
medium
198049MariaDB 11.4.0 < 11.4.2NessusDatabases5/28/20247/17/2025
medium
167850MariaDB 10.0.0 < 10.0.5 Multiple VulnerabilitiesNessusDatabases11/18/20227/17/2025
medium
167918MariaDB 10.0.0 < 10.0.12 Multiple VulnerabilitiesNessusDatabases11/18/20227/17/2025
medium
240182Atlassian Confluence 7.13.x < 8.5.23 / 8.6.x < 9.2.5 / 9.3.x < 9.5.1 (CONFSERVER-99921)NessusCGI abuses6/19/20256/19/2025
high
183299QNAP QTS / QuTS hero Path Traversal (QSA-23-42)NessusMisc.10/18/202311/7/2023
high
68907Juniper Junos SRX Series UAC Enforcer HTTP Remote Code Execution (JSA10574)NessusJunos Local Security Checks7/16/20137/12/2018
critical
210450Apache 2.4.x < 2.4.62 Multiple Vulnerabilities (Windows)NessusWeb Servers11/6/20247/2/2025
high
232199SonicWall SonicOS SSRF (CVE-2024-53705) (SNWLID-2025-0003)NessusFirewalls3/6/20253/6/2025
high
128120Cisco UCS Director Authentication Bypass (cisco-sa-20190821-imcs-ucs-authby)NessusCISCO8/26/20196/3/2021
critical
214599JetBrains TeamCity 2024.12.1 Multiple VulnerabilitiesNessusMisc.1/24/20252/14/2025
medium
181758Nagios XI < 5.11.2 Multiple VulnerabilitiesNessusCGI abuses9/21/20234/15/2025
high
156782Juniper Junos OS DoS (JSA11285)NessusJunos Local Security Checks1/18/20221/27/2022
medium
155715Jenkins Enterprise and Operations Center < 2.222.43.0.1 / 2.249.30.0.1 / 2.263.2.2 Multiple Vulnerabilities (CloudBees Security Advisory 2021-01-13)NessusCGI abuses11/29/20216/4/2024
high
154932Cisco Small Business RV Series Routers Command Injection (cisco-sa-sbrv-cmdinjection-Z5cWFdK)NessusCISCO11/5/202111/9/2021
high
154956Microsoft Windows Server Version 1809 Unsupported Version DetectionNessusWindows11/8/20214/22/2022
critical
154965Jenkins Enterprise and Operations Center < 2.249.31.0.4 / 2.277.4.3 Multiple Vulnerabilities (CloudBees Security Advisory 2021-05-11)NessusCGI abuses11/8/20216/4/2024
high
166458Cisco IOS XE ROM Monitor Software for Catalyst Switches Information Disclosure (cisco-sa-iosxe-info-disc-nrORXjO)NessusCISCO10/25/202210/25/2022
medium
166682Juniper Junos OS Cache Poisoning (JSA69888)NessusJunos Local Security Checks10/28/202211/29/2022
medium
171562Splunk Enterprise 8.1 < 8.1.13, 8.2.0 < 8.2.10, 9.0.0 < 9.0.4 (SVD-2023-0204)NessusCGI abuses2/16/20234/26/2024
high
171567Splunk Enterprise 8.1 < 8.1.13, 8.2.0 < 8.2.10, 9.0.0 < 9.0.4 (SVD-2023-0207)NessusCGI abuses2/16/20234/26/2024
medium
171868Tenable SecurityCenter 5.22.0 / 5.23.1 / 6.0.0 Apache Header Truncation (TNS-2023-06)NessusMisc.2/23/20235/10/2024
medium
171345IBM Domino SEoL (8.5.x)NessusMisc.2/10/202311/2/2023
critical
171349Apache Tomcat SEoL (6.0.x)NessusWeb Servers2/10/20235/6/2024
critical
171354IBM WebSphere Application Server SEoL (6.0.x)NessusWeb Servers2/10/202310/23/2024
critical
171355IBM WebSphere Application Server SEoL (8.0.x)NessusWeb Servers2/10/202310/23/2024
critical
171161GitLab < 15.5.7 / 15.6 < 15.6.4 / 15.7 < 15.7.2 DoS (CVE-2022-4131)NessusCGI abuses2/8/20232/16/2023
medium
171162GitLab < 15.5.7 / 15.6 < 15.6.4 / 15.7 < 15.7.2 (SECURITY-RELEASE-GITLAB-15-7-2-RELEASED) (CVE-2023-0042)NessusCGI abuses2/8/20232/9/2023
medium
187316Juniper Junos OS Vulnerability (JSA73157)NessusJunos Local Security Checks12/27/202312/28/2023
medium
187433GitLab 10.0 < 14.6.5 / 14.7 < 14.7.4 / 14.8 < 14.8.2 (CVE-2022-0751)NessusCGI abuses1/2/20245/17/2024
high
187436GitLab < 15.6.8 (CRITICAL-SECURITY-RELEASE-GITLAB-15-8-2-RELEASED)NessusCGI abuses1/2/20241/2/2024
high
187442GitLab 13.1 < 13.12.9 / 14.0 < 14.0.7 / 14.1 < 14.1.2 (CVE-2021-22244)NessusCGI abuses1/2/20245/17/2024
medium
187444GitLab < 13.12.9 (CVE-2021-22238)NessusCGI abuses1/2/20245/17/2024
medium
187448GitLab 12.10 < 14.3.6 / 14.4 < 14.4.4 / 14.5 < 14.5.2 (CVE-2021-39934)NessusCGI abuses1/2/20245/17/2024
medium
187451GitLab 13.0 < 14.3.6 / 14.4 < 14.4.4 / 14.5 < 14.5.2 (CVE-2021-39915)NessusCGI abuses1/2/20245/17/2024
medium
187460GitLab 8.15 < 14.1.7 / 14.2 < 14.2.5 / 14.3 < 14.3.1 (CVE-2021-39867)NessusCGI abuses1/2/20245/17/2024
high
187463GitLab 12.2 < 13.12.9 / 14.0 < 14.0.7 / 14.1 < 14.1.2 (CVE-2021-22249)NessusCGI abuses1/2/20245/17/2024
medium
187467GitLab 8.9 < 14.0.9 / 14.1 < 14.1.4 / 14.2 < 14.2.2 (CVE-2021-22258)NessusCGI abuses1/2/20245/17/2024
medium
187468GitLab 12.9 < 14.3.6 / 14.4 < 14.4.4 / 14.5 < 14.5.2 (CVE-2021-39917)NessusCGI abuses1/2/20245/17/2024
medium
187474GitLab 13.9 < 13.9.5 / 13.10 < 13.10.1 (CVE-2021-22201)NessusCGI abuses1/2/20245/17/2024
medium
187477GitLab 12.6 < 13.8.7 / 13.9 < 13.9.5 / 13.10 < 13.10.1 (CVE-2021-22200)NessusCGI abuses1/2/20245/17/2024
high
186884GitLab 16.3 < 16.4.4 / 16.5 < 16.5.4 / 16.6 < 16.6.2 (CVE-2023-5512)NessusCGI abuses12/14/20235/17/2024
medium
186885GitLab 9.3 < 16.4.4 / 16.5 < 16.5.4 / 16.6 < 16.6.2 (CVE-2023-5061)NessusCGI abuses12/14/20235/17/2024
medium