Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tenable nessus 6.1.1 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2019-15903
In libexpat prior to 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.
Libexpat Project Libexpat
Python Python
7.4
CVSSv3
CVE-2017-11506
When linking a Nessus scanner or agent to Tenable.io or other manager, Nessus 6.x prior to 6.11 does not verify the manager's TLS certificate when making the initial outgoing connection. This could allow man-in-the-middle attacks.
Tenable Nessus 6.3.7
Tenable Nessus 6.10.7
Tenable Nessus 6.6.1
Tenable Nessus 6.10.9
Tenable Nessus 6.5.3
Tenable Nessus 6.9.1
Tenable Nessus 6.5.6
Tenable Nessus 6.10.4
Tenable Nessus 6.6.0
Tenable Nessus 6.1.2
Tenable Nessus 6.5.5
Tenable Nessus 6.0.2
Tenable Nessus 6.3.1
Tenable Nessus 6.2.1
Tenable Nessus 6.10.3
Tenable Nessus 6.1.0
Tenable Nessus 6.5.4
Tenable Nessus 6.7.0
Tenable Nessus 6.4.1
Tenable Nessus 6.10.1
Tenable Nessus 6.4.2
Tenable Nessus 6.3.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-38627
CVE-2022-45803
CVE-2024-38319
camera
template injection
CVE-2024-27801
CVE-2024-0762
CVE-2024-5791
unauthorized
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started