Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tenable nessus 6.1.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-15903
In libexpat prior to 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Libexpat Project Libexpat
Python Python
5.8
CVSSv2
CVE-2017-11506
When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x prior to 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.
Tenable Nessus 6.1.1
Tenable Nessus 6.1.2
Tenable Nessus 6.2.0
Tenable Nessus 6.2.1
Tenable Nessus 6.5.1
Tenable Nessus 6.5.2
Tenable Nessus 6.5.3
Tenable Nessus 6.5.4
Tenable Nessus 6.10.9
Tenable Nessus 6.10.8
Tenable Nessus 6.10.7
Tenable Nessus 6.10.6
Tenable Nessus 6.3.3
Tenable Nessus 6.3.2
Tenable Nessus 6.3.1
Tenable Nessus 6.3.0
Tenable Nessus 6.6.0
Tenable Nessus 6.7.0
Tenable Nessus 6.8.1
Tenable Nessus 6.8.0
Tenable Nessus 6.10.0
Tenable Nessus 6.0.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started