Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tenable nessus 6.1.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-15903
In libexpat prior to 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Libexpat Project Libexpat
Python Python
7.4
CVSSv3
CVE-2017-11506
When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x prior to 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.
Tenable Nessus 6.3.7
Tenable Nessus 6.10.7
Tenable Nessus 6.6.1
Tenable Nessus 6.10.9
Tenable Nessus 6.5.3
Tenable Nessus 6.9.1
Tenable Nessus 6.5.6
Tenable Nessus 6.10.4
Tenable Nessus 6.6.0
Tenable Nessus 6.1.2
Tenable Nessus 6.5.5
Tenable Nessus 6.0.2
Tenable Nessus 6.3.1
Tenable Nessus 6.2.1
Tenable Nessus 6.10.3
Tenable Nessus 6.1.0
Tenable Nessus 6.5.4
Tenable Nessus 6.7.0
Tenable Nessus 6.4.1
Tenable Nessus 6.10.1
Tenable Nessus 6.4.2
Tenable Nessus 6.3.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started