Plugins Pipeline

At Tenable, we use a multitude of approaches to deliver the best possible coverage to our customers and use a number of factors to prioritize vulnerabilities. Browse upcoming plugins that the Tenable Research team is prioritizing by CVE, detection status or keyword search. Please note that this page does not represent an exhaustive list of plugins that Tenable Research intends to provide coverage for nor for which plugin coverage is provided.

Plugins are categorized into one of the following detection statuses:

  • Development: Tenable Research team is actively working on providing a detection.
  • Testing: The plugin is in the production build & release pipeline.
  • Released: The plugin has been published on the displayed date.
TitleCVEsUpdatedStatus
photon_os PHSA-2025-4.0-0780: Unknown PhotonOS Security UpdatedCVE-2025-218634/15/2025testing
photon_os PHSA-2025-5.0-0502: Unknown PhotonOS Security UpdatedCVE-2024-81764/15/2025testing
solarwinds solarwinds_serv-u_15_5_1: SolarWinds Serv-U 15.5.1CVE-2024-457124/15/2025testing
Security Update for mod_auth_openidcCVE-2025-314924/15/2025development
vendor_unpatched cve-2025-3576: Unpatched CVEs for Debian Linux (cve-2025-3576)CVE-2025-35764/15/2025development
Security Update for DotNetNuke.CoreCVE-2025-323724/15/2025development
Security Update for OpenSSHCVE-2025-327284/15/2025development
Multiple Vulnerabilities in LabVIEWCVE-2025-2630, CVE-2025-2631, CVE-2025-2629, CVE-2025-26324/15/2025development
Multiple Vulnerabilities in Rockwell Automation ArenaCVE-2025-3286, CVE-2025-3287, CVE-2025-3289, CVE-2025-3285, CVE-2025-2286, CVE-2025-3288, CVE-2025-2287, CVE-2025-2293, CVE-2025-2285, CVE-2025-2288, CVE-2025-28294/15/2025development
juniper JSA96462: JSA96462 : 2025-04 Security Bulletin: Junos OS and Junos OS Evolved: Executing a specific CLI command when asregex-optimized is configured causes an RPD crash (CVE-2025-30652)CVE-2025-30652, CVE-2025-30644, CVE-2025-30647, CVE-2025-30645, CVE-2025-30648, CVE-2025-30646, CVE-2025-30658, CVE-2025-30659, CVE-2025-21594, CVE-2025-21597, CVE-2025-30651, CVE-2025-30657, CVE-2025-30660, CVE-2025-21591, CVE-2025-21601, CVE-2025-21595, CVE-2025-30654, CVE-2025-306564/15/2025development
juniper JSA96461: JSA96461 : 2025-04 Security Bulletin: Junos OS and Junos OS Evolved: Receipt of a specific ICMPv6 packet causes a memory overrun leading to an rpd crash (CVE-2025-30651)CVE-2025-30652, CVE-2025-30644, CVE-2025-30647, CVE-2025-30645, CVE-2025-30648, CVE-2025-30646, CVE-2025-30658, CVE-2025-30659, CVE-2025-21594, CVE-2025-21597, CVE-2025-30651, CVE-2025-30657, CVE-2025-30660, CVE-2025-21591, CVE-2025-21601, CVE-2025-21595, CVE-2025-30654, CVE-2025-306564/15/2025development
juniper JSA96453: JSA96453 : 2025-04 Security Bulletin: Junos OS: EX2300, EX3400, EX4000 Series, QFX5k Series: Receipt of a specific DHCP packet causes FPC crash when DHCP Option 82 is enabled (CVE-20CVE-2025-30652, CVE-2025-30644, CVE-2025-30647, CVE-2025-30645, CVE-2025-30648, CVE-2025-30646, CVE-2025-30658, CVE-2025-30659, CVE-2025-21594, CVE-2025-21597, CVE-2025-30651, CVE-2025-30657, CVE-2025-30660, CVE-2025-21591, CVE-2025-21601, CVE-2025-21595, CVE-2025-30654, CVE-2025-306564/15/2025development
juniper JSA96448: JSA96448 : 2025-04 Security Bulletin: Junos OS: An unauthenticated adjacent attacker sending a malformed DHCP packet causes jdhcpd to crash (CVE-2025-21591)CVE-2025-30652, CVE-2025-30644, CVE-2025-30647, CVE-2025-30645, CVE-2025-30648, CVE-2025-30646, CVE-2025-30658, CVE-2025-30659, CVE-2025-21594, CVE-2025-21597, CVE-2025-30651, CVE-2025-30657, CVE-2025-30660, CVE-2025-21591, CVE-2025-21601, CVE-2025-21595, CVE-2025-30654, CVE-2025-306564/15/2025development
juniper JSA96449: JSA96449 : 2025-04 Security Bulletin: Junos OS: MX Series: In DS-lite and NAT senario receipt of crafted IPv4 traffic causes port block (CVE-2025-21594)CVE-2025-30652, CVE-2025-30644, CVE-2025-30647, CVE-2025-30645, CVE-2025-30648, CVE-2025-30646, CVE-2025-30658, CVE-2025-30659, CVE-2025-21594, CVE-2025-21597, CVE-2025-30651, CVE-2025-30657, CVE-2025-30660, CVE-2025-21591, CVE-2025-21601, CVE-2025-21595, CVE-2025-30654, CVE-2025-306564/15/2025development
juniper JSA96450: JSA96450 : 2025-04 Security Bulletin: Junos OS and Junos OS Evolved: In an EVPN-VXLAN scenario specific ARP or NDP packets cause FPC to crash (CVE-2025-21595)CVE-2025-30652, CVE-2025-30644, CVE-2025-30647, CVE-2025-30645, CVE-2025-30648, CVE-2025-30646, CVE-2025-30658, CVE-2025-30659, CVE-2025-21594, CVE-2025-21597, CVE-2025-30651, CVE-2025-30657, CVE-2025-30660, CVE-2025-21591, CVE-2025-21601, CVE-2025-21595, CVE-2025-30654, CVE-2025-306564/15/2025development
juniper JSA96464: JSA96464 : 2025-04 Security Bulletin: Junos OS and Junos OS Evolved: A local, low privileged user can access sensitive information (CVE-2025-30654)CVE-2025-30652, CVE-2025-30644, CVE-2025-30647, CVE-2025-30645, CVE-2025-30648, CVE-2025-30646, CVE-2025-30658, CVE-2025-30659, CVE-2025-21594, CVE-2025-21597, CVE-2025-30651, CVE-2025-30657, CVE-2025-30660, CVE-2025-21591, CVE-2025-21601, CVE-2025-21595, CVE-2025-30654, CVE-2025-306564/15/2025development
juniper JSA96449: JSA96449 : 2025-04 Security Bulletin: Junos OS: MX Series: In DS-lite and NAT senario receipt of crafted IPv6 traffic causes port block (CVE-2025-21594)CVE-2025-30652, CVE-2025-30644, CVE-2025-30647, CVE-2025-30645, CVE-2025-30648, CVE-2025-30646, CVE-2025-30658, CVE-2025-30659, CVE-2025-21594, CVE-2025-21597, CVE-2025-30651, CVE-2025-30657, CVE-2025-30660, CVE-2025-21591, CVE-2025-21601, CVE-2025-21595, CVE-2025-30654, CVE-2025-306564/15/2025development
photon_os PHSA-2021-3.0-0196: Unknown PhotonOS Security UpdatedCVE-2020-35507, CVE-2020-35494, CVE-2020-8566, CVE-2020-35496, CVE-2020-35342, CVE-2020-35495, CVE-2020-35493, CVE-2020-85644/15/2025development
photon_os PHSA-2021-3.0-0182: Unknown PhotonOS Security UpdatedCVE-2020-29569, CVE-2020-29660, CVE-2020-29661, CVE-2020-27830, CVE-2020-29568, CVE-2021-0938, CVE-2020-35519, CVE-2021-201774/15/2025development
redhat RHSA-2015:0629: RHSA-2015:0629: firefox security update (Critical)CVE-2015-0836, CVE-2015-0822, CVE-2015-0827, CVE-2015-08314/15/2025development
vendor_unpatched cve-2020-15709: Unpatched CVEs for Debian Linux (cve-2020-15709)CVE-2020-157094/15/2025development
vendor_unpatched cve-2025-3277: Unpatched CVEs for Red Hat Enterprise Linux (cve-2025-3277)CVE-2025-32774/15/2025development
vendor_unpatched cve-2025-32911: Unpatched CVEs for Debian Linux, Red Hat Enterprise Linux (cve-2025-32911)CVE-2025-329114/15/2025development
vendor_unpatched cve-2025-32914: Unpatched CVEs for Debian Linux (cve-2025-32914)CVE-2025-329144/15/2025development
vendor_unpatched cve-2025-32908: Unpatched CVEs for Debian Linux (cve-2025-32908)CVE-2025-329084/15/2025development
vendor_unpatched cve-2025-3548: Unpatched CVEs for Debian Linux (cve-2025-3548)CVE-2025-35484/15/2025development
vendor_unpatched cve-2025-32906: Unpatched CVEs for Debian Linux (cve-2025-32906)CVE-2025-329064/15/2025development
vendor_unpatched cve-2025-32907: Unpatched CVEs for Debian Linux (cve-2025-32907)CVE-2025-329074/15/2025development
vendor_unpatched cve-2025-32913: Unpatched CVEs for Debian Linux (cve-2025-32913)CVE-2025-329134/15/2025development
vendor_unpatched cve-2025-32910: Unpatched CVEs for Debian Linux (cve-2025-32910)CVE-2025-329104/15/2025development
vendor_unpatched cve-2025-32909: Unpatched CVEs for Debian Linux (cve-2025-32909)CVE-2025-329094/15/2025development
vendor_unpatched cve-2025-32912: Unpatched CVEs for Debian Linux (cve-2025-32912)CVE-2025-329124/15/2025development
vendor_unpatched cve-2025-3549: Unpatched CVEs for Debian Linux (cve-2025-3549)CVE-2025-35494/15/2025development
vendor_unpatched cve-2023-30801: Unpatched CVEs for Debian Linux (cve-2023-30801)CVE-2023-308014/14/2025development
[Web App Scanning] FortiOS Authentication BypassCVE-2024-555914/14/2025testing
vendor_unpatched cve-2008-4953: Unpatched CVEs for Debian Linux (cve-2008-4953)CVE-2008-49534/14/2025development
vendor_unpatched cve-2021-46055: Unpatched CVEs for Debian Linux (cve-2021-46055)CVE-2021-460554/14/2025development
vendor_unpatched cve-2021-46054: Unpatched CVEs for Debian Linux (cve-2021-46054)CVE-2021-460544/14/2025development
vendor_unpatched cve-2021-46050: Unpatched CVEs for Debian Linux (cve-2021-46050)CVE-2021-460504/14/2025development
vendor_unpatched cve-2021-46052: Unpatched CVEs for Debian Linux (cve-2021-46052)CVE-2021-460524/14/2025development
vendor_unpatched cve-2021-46053: Unpatched CVEs for Debian Linux (cve-2021-46053)CVE-2021-460534/14/2025development
vendor_unpatched cve-2021-46048: Unpatched CVEs for Debian Linux (cve-2021-46048)CVE-2021-460484/14/2025development
vendor_unpatched cve-2024-56406: Unpatched CVEs for Debian Linux (cve-2024-56406)CVE-2024-564064/13/2025development
vendor_unpatched cve-2025-2814: Unpatched CVEs for Debian Linux (cve-2025-2814)CVE-2025-28144/13/2025development
vendor_unpatched cve-2023-43361: Unpatched CVEs for Debian Linux (cve-2023-43361)CVE-2023-433614/13/2025development
vendor_unpatched cve-2020-10693: Unpatched CVEs for Debian Linux (cve-2020-10693)CVE-2020-106934/12/2025development
vendor_unpatched cve-2021-33813: Unpatched CVEs for Debian Linux (cve-2021-33813)CVE-2021-338134/12/2025development
vendor_unpatched cve-2019-0231: Unpatched CVEs for Debian Linux (cve-2019-0231)CVE-2019-02314/12/2025development
vendor_unpatched cve-2019-10219: Unpatched CVEs for Debian Linux (cve-2019-10219)CVE-2019-102194/12/2025development
vendor_unpatched cve-2016-2141: Unpatched CVEs for Debian Linux (cve-2016-2141)CVE-2016-21414/12/2025development