Plugins Search

IDNameProductFamilyPublishedUpdatedSeverity
187676QNAP QTS / QuTS hero Vulnerability in QTS and QuTS hero (QSA-23-54)NessusMisc.1/8/20241/15/2024
high
187677QNAP QTS / QuTS hero Multiple Vulnerabilities in QTS and QuTS hero (QSA-23-27)NessusMisc.1/8/20241/11/2024
high
188069Atlassian Confluence < 7.19.18 / 8.0.x < 8.5.5 / 8.6.x < 8.7.2 (CONFSERVER-94066)NessusCGI abuses1/16/20246/5/2024
high
189297Splunk Enterprise 9.0.0 < 9.0.8, 9.1.0 < 9.1.3 (SVD-2024-0108)NessusCGI abuses1/22/20244/26/2024
high
189298Splunk Enterprise 9.0.0 < 9.0.8, 9.1.0 < 9.1.3 (SVD-2024-0105)NessusCGI abuses1/22/20244/26/2024
medium
189374Juniper Junos OS Vulnerability (JSA75758)NessusJunos Local Security Checks1/23/20242/1/2024
medium
189531Cisco Unified Communications Manager RCE (cisco-sa-cucm-rce-bWNzQcUm)NessusCISCO1/25/20242/2/2024
critical
189533Cisco Unified Communications Manager IM & Presence RCE (cisco-sa-cucm-rce-bWNzQcUm)NessusCISCO1/25/20242/2/2024
critical
189592GitLab 12.7 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2023-6159)NessusCGI abuses1/25/20245/17/2024
medium
189593GitLab 14.0 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2024-0456)NessusCGI abuses1/25/20245/3/2024
medium
189594GitLab 16.0 < 16.5.8 / 16.6 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2024-0402)NessusCGI abuses1/25/20245/3/2024
critical
189596GitLab 13.7 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2023-5933)NessusCGI abuses1/25/20245/17/2024
medium
189764Cisco IOS XE Software Layer 2 Tunneling Protocol DoS (cisco-sa-ios-xe-l2tp-dos-eB5tuFmV)NessusCISCO1/30/20241/31/2024
high
190357QNAP QTS / QuTS hero Multiple Vulnerabilities in QTS, QuTS hero, and QuTScloud (QSA-24-02)NessusMisc.2/9/20242/12/2024
medium
190681QNAP QTS Vulnerability in QTS (QSA-24-01)NessusMisc.2/19/20242/19/2024
medium
190863GitLab 12.0 < 16.7.6 / 16.8 < 16.8.3 / 16.9 < 16.9.1 (CVE-2023-4895)NessusCGI abuses2/21/20245/17/2024
medium
190865GitLab 16.9.0 < 16.9.1 (CVE-2024-1451)NessusCGI abuses2/21/20245/3/2024
high
191465Cisco Nexus 3600 External BGP DoS (cisco-sa-nxos-po-acl-TkyePgvL)NessusCISCO3/1/20242/27/2025
high
191469Cisco NX-OS Software MPLS Encapsulated IPv6 DoS (cisco-sa-ipv6-mpls-dos-R9ycXkwM)NessusCISCO3/1/20242/27/2025
high
191554IBM WebSphere Application Server Liberty 17.0.0.3 < 24.0.0.3 (7125527)NessusWeb Servers3/5/20248/13/2025
medium
191555Atlassian Confluence 4.1.x < 7.19.17 / 8.0.x < 8.5.4 / 8.6.x < 8.6.2 / 8.7.x < 8.7.2 / 8.8.0 (CONFSERVER-94108)NessusCGI abuses3/5/20246/5/2024
high
192031Palo Alto Networks PAN-OS 9.0.x < 9.0.17-h4 / 9.1.x < 9.1.17 / 10.1.x < 10.1.12 / 10.2.x < 10.2.8 / 11.0.x < 11.0.3 VulnerabilityNessusPalo Alto Local Security Checks3/13/20242/2/2026
low
192108Cisco IOS XR Software Authenticated CLI SCP/SFTP DoS (cisco-sa-iosxr-scp-dos-kb6sUUHw)NessusCISCO3/14/20249/13/2024
medium
192465Cisco IOS XR Software SSH Privilege Escalation (cisco-sa-iosxr-ssh-privesc-eWDMKew3)NessusCISCO3/22/20249/13/2024
high
193424Apache 2.4.x < 2.4.54 Multiple Vulnerabilities (mod_lua)NessusWeb Servers4/17/20244/18/2024
high
193487Juniper Junos OS Vulnerability (JSA75757)NessusJunos Local Security Checks4/18/20244/18/2024
high
193490Juniper Junos OS Vulnerability (JSA75754)NessusJunos Local Security Checks4/18/202410/28/2024
medium
193491Juniper Junos OS Vulnerability (JSA75742)NessusJunos Local Security Checks4/18/20244/18/2024
medium
193492Juniper Junos OS Vulnerability (JSA75743)NessusJunos Local Security Checks4/18/20244/18/2024
high
193584Cisco IOS XE Software SNMP Extended Named Access Control List Bypass (cisco-sa-snmp-uwBXfqww)NessusCISCO4/19/20249/27/2024
medium
193953Splunk Enterprise 9.0.0 < 9.0.4 (SVD-2023-0202)NessusCGI abuses4/26/20244/26/2024
medium
194909Atlassian Confluence < 7.19.20 / 7.20.x < 8.5.7 / 8.6.x < 8.9.0 (CONFSERVER-95099)NessusCGI abuses5/2/20246/5/2024
high
194924Splunk Enterprise 8.1 < 8.1.13, 8.2.0 < 8.2.10, 9.0.0 < 9.0.4 (SVD-2023-0215)NessusCGI abuses5/2/20245/2/2024
high
194925Splunk Enterprise 9.0.0 < 9.0.7, 9.1.0 < 9.1.2 (SVD-2023-1105)NessusCGI abuses5/2/20245/12/2025
high
194957GitLab 16.1 < 16.7.6 / 16.8 < 16.8.3 / 16.9 < 16.9.1 (CVE-2024-1525)NessusCGI abuses5/3/20245/3/2024
medium
197304GitLab 13.8 < 13.8.5 / 13.9 < 13.9.2 (CVE-2021-22185)NessusCGI abuses5/17/20245/17/2024
medium
197306GitLab 12.10 < 13.2.10 / 13.3 < 13.3.7 / 13.4 < 13.4.2 (CVE-2020-13339)NessusCGI abuses5/17/20245/17/2024
medium
197309GitLab 15.11 < 16.1.5 / 16.2 < 16.2.5 / 16.3 < 16.3.1 (CVE-2023-3210)NessusCGI abuses5/17/20245/17/2024
medium
197311GitLab 13.9 < 13.11.6 / 13.12 < 13.12.6 / 14.0 < 14.0.2 (CVE-2021-22226)NessusCGI abuses5/17/20245/17/2024
medium
197312GitLab < 15.1.6 (CVE-2022-3030)NessusCGI abuses5/17/20245/17/2024
medium
197313GitLab 11.3 < 14.1.7 / 14.2 < 14.2.5 / 14.3 < 14.3.1 (CVE-2021-39876)NessusCGI abuses5/17/20245/17/2024
medium
197315GitLab 8.4 < 13.0.12 / 13.1 < 13.1.6 / 13.2 < 13.2.3 (CVE-2020-13290)NessusCGI abuses5/17/20245/17/2024
high
197316GitLab 11.8 < 12.10.13 (CVE-2020-13336)NessusCGI abuses5/17/20245/17/2024
medium
197319GitLab 8.7 < 13.1.10 / 13.2 < 13.2.8 / 13.3 < 13.3.4 (CVE-2020-13289)NessusCGI abuses5/17/20245/17/2024
medium
197351GitLab 12.8 < 13.6.6 / 13.7.0 < 13.7.6 / 13.8.0 < 13.8.2 (CVE-2021-22184)NessusCGI abuses5/17/20245/17/2024
medium
197352GitLab 12.8 < 13.6.6 / 13.7.0 < 13.7.6 / 13.8.0 < 13.8.2 (CVE-2021-22172)NessusCGI abuses5/17/20245/17/2024
medium
197355GitLab 8.14 < 13.3.9 / 13.4 < 13.4.5 / 13.5 < 13.5.2 (CVE-2020-13355)NessusCGI abuses5/17/20245/17/2024
high
197357GitLab 8.16 < 12.10.13 / 13.0 < 13.0.8 / 13.1 < 13.1.2 (CVE-2020-13319)NessusCGI abuses5/17/20245/17/2024
medium
197358GitLab 12.8 < 12.9.8 / 12.10 < 12.10.7 / 13.0 < 13.0.1 (CVE-2020-13267)NessusCGI abuses5/17/20245/17/2024
medium
197360GitLab 11.9 < 14.0.9 / 14.1 < 14.1.4 / 14.2 < 14.2.2 (CVE-2021-39880)NessusCGI abuses5/17/20245/17/2024
medium