Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tenable nessus 6.1.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-15903
In libexpat prior to 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Libexpat Project Libexpat
Python Python
7.4
CVSSv3
CVE-2017-11506
When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x prior to 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.
Tenable Nessus 6.3.7
Tenable Nessus 6.10.7
Tenable Nessus 6.6.1
Tenable Nessus 6.10.9
Tenable Nessus 6.5.3
Tenable Nessus 6.9.1
Tenable Nessus 6.5.6
Tenable Nessus 6.10.4
Tenable Nessus 6.6.0
Tenable Nessus 6.1.2
Tenable Nessus 6.5.5
Tenable Nessus 6.0.2
Tenable Nessus 6.3.1
Tenable Nessus 6.2.1
Tenable Nessus 6.10.3
Tenable Nessus 6.1.0
Tenable Nessus 6.5.4
Tenable Nessus 6.7.0
Tenable Nessus 6.4.1
Tenable Nessus 6.10.1
Tenable Nessus 6.4.2
Tenable Nessus 6.3.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started