Plugins Search

IDNameProductFamilyPublishedUpdatedSeverity
159568QNAP QTS / QuTS hero Insufficient HTTP Security Headers (QSA-21-03)NessusMisc.4/7/20228/12/2022
medium
159713Palo Alto Networks PAN-OS 8.1.x < 8.1.22 / 9.0.x < 9.0.16 / 9.1.x < 9.1.13 / 10.0.x < 10.0.10 / 10.1.x < 10.1.5 VulnerabilityNessusPalo Alto Local Security Checks4/13/20224/26/2022
medium
159821GitLab 13.7 < 14.7.7 / 14.8 < 14.8.5 / 14.9 < 14.9.2 (CVE-2022-1174)NessusCGI abuses4/18/20225/17/2024
high
159825GitLab 7.8 < 14.7.7 / 14.8 < 14.8.5 / 14.9 < 14.9.2 (CVE-2022-0740)NessusCGI abuses4/18/20225/17/2024
medium
159956GitLab 12.0 < 14.4.5 / 14.5.0 < 14.5.3 / 14.6.0 < 14.6.2 (CVE-2022-0125)NessusCGI abuses4/20/20225/17/2024
medium
159958GitLab 12.0 < 14.3.6 / 14.4 < 14.4.4 / 14.5 < 14.5.2 (CVE-2021-39942)NessusCGI abuses4/20/20225/17/2024
medium
159964GitLab < 14.4.5 (CVE-2022-0124)NessusCGI abuses4/20/20225/17/2024
medium
160076Juniper Junos OS DoS (JSA69493)NessusJunos Local Security Checks4/22/20226/18/2024
high
160181Cisco IOS and IOS XE Software UDP DoS (cisco-sa-iox-cmdinj-RkSURGHG)NessusCISCO4/25/20225/3/2024
high
157862Palo Alto Networks PAN-OS 8.1.x < 8.1.21 / 9.0.x < 9.1.12 / 9.1.x < 9.1.12 / 10.0.x < 10.0.8 / 10.1.x < 10.1.3 VulnerabilityNessusPalo Alto Local Security Checks2/9/20226/16/2023
medium
157903Cisco NX-OS Software MPLS OAM DoS (cisco-sa-nxos-mpls-oam-dos-sGO9x5GM)NessusCISCO2/11/20222/9/2023
high
161609Splunk Enterprise 8.1 < 8.1.4 XSSNessusCGI abuses5/27/20229/5/2022
medium
159234Juniper Junos OS Spoofing (JSA11240)NessusJunos Local Security Checks3/25/202211/30/2022
medium
159271Juniper Junos OS Privilege Escalation (JSA11237)NessusJunos Local Security Checks3/29/20224/26/2022
high
159362Palo Alto Networks PAN-OS 8.1.x < 8.1.23 / 9.0.x < 9.0.16-h2 / 9.1.x < 9.1.13-h3 / 10.0.x < 10.0.10 / 10.1.x < 10.1.5-h1 / 10.2.x < 10.2.1 VulnerabilityNessusPalo Alto Local Security Checks3/31/20227/26/2022
high
159376Tenable Nessus 10.x < 10.1.2 / 8.x < 8.15.4 Third-Party Vulnerability (TNS-2022-06)NessusMisc.3/31/20222/8/2023
high
159377Jenkins plugins Multiple Vulnerabilities (2022-03-29)NessusCGI abuses3/31/20226/5/2024
high
162753Atlassian Jira < 8.13.18 / 8.14.x < 8.20.6 / 8.21.x < 8.22.0 (JRASERVER-73594)NessusCGI abuses7/6/20226/5/2024
high
162756Atlassian Jira < 8.13.14 / 8.14.x < 8.19.0 (JRASERVER-72738)NessusCGI abuses7/6/20226/5/2024
medium
163074GitLab 14.5 < 14.10.5 / 15.0 < 15.0.4 / 15.1 < 15.1.1 (CVE-2022-2235)NessusCGI abuses7/13/20225/17/2024
medium
163292Oracle MySQL Enterprise Monitor (July 2022 CPU)NessusCGI abuses7/20/202211/1/2023
critical
158208Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod Multi-Site TCP DoS (cisco-sa-n9kaci-tcp-dos-YXukt6gM)NessusCISCO2/21/20222/22/2022
high
158672Jenkins Enterprise and Operations Center 2.277.x < 2.277.43.0.6 / 2.303.x < 2.303.30.0.5 / 2.319.3.3 Multiple DoS (CloudBees Security Advisory 2022-02-09)NessusCGI abuses3/7/20226/4/2024
high
158760Palo Alto Networks PAN-OS 8.1.x < 8.1.21 / 9.0.x < 9.1.11 / 9.1.x < 9.1.11 / 10.0.x < 10.0.7 VulnerabilityNessusPalo Alto Local Security Checks3/9/20223/14/2022
medium
158891GitLab 8.15 < 14.6.5 / 14.7 < 14.7.4 / 14.8 < 14.8.2 (CVE-2022-0489)NessusCGI abuses3/14/20225/17/2024
medium
197189OpenSSL 3.3.0 < 3.3.1 Multiple VulnerabilitiesNessusWeb Servers5/16/20246/7/2024
medium
197213MariaDB 11.2.0 < 11.2.4NessusDatabases5/16/20245/16/2024
medium
197305GitLab 12.2 < 13.4.7 / 13.5 < 13.5.5 / 13.6 < 13.6.2 (CVE-2020-26415)NessusCGI abuses5/17/20245/17/2024
medium
197307GitLab 11.8 < 13.6.6 / 13.7 < 13.7.6 / 13.8 < 13.8.2 (CVE-2021-22183)NessusCGI abuses5/17/20245/17/2024
medium
197311GitLab 13.9 < 13.11.6 / 13.12 < 13.12.6 / 14.0 < 14.0.2 (CVE-2021-22226)NessusCGI abuses5/17/20245/17/2024
medium
197314GitLab 9.4 < 13.7.8 / 13.8 < 13.8.5 / 13.9 < 13.9.2 (CVE-2021-22186)NessusCGI abuses5/17/20245/17/2024
medium
197315GitLab 8.4 < 13.0.12 / 13.1 < 13.1.6 / 13.2 < 13.2.3 (CVE-2020-13290)NessusCGI abuses5/17/20245/17/2024
high
197316GitLab 11.8 < 12.10.13 (CVE-2020-13336)NessusCGI abuses5/17/20245/17/2024
medium
197318GitLab 1.0 < 13.1.10 / 13.2 < 13.2.8 / 13.3 < 13.3.4 (CVE-2020-13297)NessusCGI abuses5/17/20245/17/2024
medium
197326GitLab 8.0 < 13.11.6 / 13.12 < 13.12.6 / 14.0 < 14.0.2 (CVE-2021-22231)NessusCGI abuses5/17/20245/17/2024
medium
197329GitLab 13.9 < 16.3.6 / 16.4.0 < 16.4.2 / 16.5.0 < 16.5.1 (CVE-2023-5963)NessusCGI abuses5/17/20245/17/2024
medium
197331GitLab 7.12 < 13.2.10 / 13.3.0 < 13.3.7 / 13.4.0 < 13.4.2 (CVE-2020-13335)NessusCGI abuses5/17/20245/17/2024
medium
197337GitLab 12.1 < 13.5.6 / 13.6 < 13.6.4 / 13.7 < 13.7.2 (CVE-2021-22167)NessusCGI abuses5/17/20245/17/2024
high
197338GitLab 13.2 < 13.2.3 (CVE-2020-13291)NessusCGI abuses5/17/20245/17/2024
high
197339GitLab 13.4 < 13.4.7 / 13.5 < 13.5.5 / 13.6 < 13.6.2 (CVE-2020-26413)NessusCGI abuses5/17/20245/17/2024
medium
197342GitLab 13.3 < 13.3.9 / 13.4 < 13.4.5 / 13.5 < 13.5.2 (CVE-2020-13358)NessusCGI abuses5/17/20245/17/2024
medium
197348GitLab 13.3 < 13.3.9 / 13.4 < 13.4.5 / 13.5 < 13.5.2 (CVE-2020-26406)NessusCGI abuses5/17/20245/17/2024
medium
197356GitLab 11.5.0 < 13.5.6 / 13.6.0 < 13.6.4 / 13.7.0 < 13.7.2 (CVE-2021-22171)NessusCGI abuses5/17/20245/17/2024
medium
197361GitLab 12.6.2 < 12.10.13 (CVE-2020-13329)NessusCGI abuses5/17/20245/17/2024
medium
197364GitLab 12.10 < 12.10.7 / 13.0 < 13.0.1 (CVE-2020-13269)NessusCGI abuses5/17/20245/17/2024
medium
197368GitLab 13.0 < 13.1.10 / 13.2 < 13.2.8 / 13.3 < 13.3.4 (CVE-2020-13287)NessusCGI abuses5/17/20245/17/2024
medium
197378GitLab 10.2 < 13.3.9 / 13.4 < 13.4.5 / 13.5 < 13.5.2 (CVE-2020-13352)NessusCGI abuses5/17/20245/17/2024
medium
197402GitLab 12.4 < 13.2.10 / 13.3 < 13.3.7 / 13.4 < 13.4.2 (CVE-2020-13340)NessusCGI abuses5/17/20245/17/2024
high
197416GitLab 11.8 < 12.10.13 / 13.0 < 13.0.8 / 13.1 < 13.1.2 (CVE-2020-13326)NessusCGI abuses5/17/20245/17/2024
medium
197417GitLab 16.2 < 16.2.5 / 16.3 < 16.3.1 (CVE-2023-3950)NessusCGI abuses5/17/20245/17/2024
low