Plugins Pipeline

At Tenable, we use a multitude of approaches to deliver the best possible coverage to our customers and use a number of factors to prioritize vulnerabilities. Browse upcoming plugins that the Tenable Research team is prioritizing by CVE, detection status or keyword search. Please note that this page does not represent an exhaustive list of plugins that Tenable Research intends to provide coverage for nor for which plugin coverage is provided.

Plugins are categorized into one of the following detection statuses:

  • Development: Tenable Research team is actively working on providing a detection.
  • Testing: The plugin is in the production build & release pipeline.
  • Released: The plugin has been published on the displayed date.
TitleCVEsUpdatedStatus
Direct Check - CyberPanel Incorrect Default Permissions Vulnerability (CVE-2024-51378)CVE-2024-513782025/7/21development
oracle CPUJul2025: Primavera P6 Enterprise Project Portfolio ManagementCVE-2025-48734, CVE-2025-500612025/7/15development
oracle CPUJul2025: WebCenter PortalCVE-2024-38477, CVE-2024-26308, CVE-2024-25710, CVE-2024-52046, CVE-2024-8176, CVE-2024-38472, CVE-2024-56171, CVE-2025-30065, CVE-2024-38819, CVE-2024-57699, CVE-2025-48734, CVE-2025-27553, CVE-2024-12801, CVE-2024-21131, CVE-2025-31651, CVE-2025-50073, CVE-2025-30759, CVE-2025-27113, CVE-2025-30474, CVE-2024-8184, CVE-2022-45693, CVE-2024-21094, CVE-2024-38820, CVE-2025-30762, CVE-2025-50061, CVE-2024-38828, CVE-2025-27818, CVE-2025-32415, CVE-2025-27819, CVE-2025-50060, CVE-2024-24795, CVE-2024-47072, CVE-2025-50064, CVE-2023-39017, CVE-2024-47561, CVE-2024-6763, CVE-2025-31650, CVE-2025-49146, CVE-2025-50072, CVE-2025-31672, CVE-2025-0725, CVE-2025-30753, CVE-2023-42917, CVE-2024-47554, CVE-2024-39884, CVE-2025-24928, CVE-2024-12798, CVE-2025-32414, CVE-2025-23184, CVE-2025-29482, CVE-2025-27817, CVE-2024-13176, CVE-2024-91432025/7/15development
oracle CPUJul2025: NoSQL DatabaseCVE-2023-44483, CVE-2025-30748, CVE-2020-13936, CVE-2025-24970, CVE-2024-57699, CVE-2025-50062, CVE-2025-23083, CVE-2025-23085, CVE-2025-23084, CVE-2025-25193, CVE-2025-27820, CVE-2025-30747, CVE-2024-13176, CVE-2024-9143, CVE-2024-261432025/7/15development
oracle CPUJul2025: MySQL Cluster 9.3.1CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-23016, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: MySQL Cluster 9.2.1CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-30760, CVE-2024-37891, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-23016, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: Oracle E-Business SuiteCVE-2025-30743, CVE-2025-50090, CVE-2025-30744, CVE-2025-30739, CVE-2025-30746, CVE-2025-50105, CVE-2025-50071, CVE-2025-30745, CVE-2025-501072025/7/15development
oracle CPUJul2025: Business Intelligence Enterprise EditionCVE-2025-50060, CVE-2025-30065, CVE-2025-48734, CVE-2025-23184, CVE-2025-50061, CVE-2025-307592025/7/15development
oracle CPUJul2025: Identity ManagerCVE-2024-38477, CVE-2024-26308, CVE-2024-25710, CVE-2024-52046, CVE-2024-8176, CVE-2024-38472, CVE-2024-56171, CVE-2025-30065, CVE-2024-38819, CVE-2024-57699, CVE-2025-48734, CVE-2025-27553, CVE-2024-12801, CVE-2024-21131, CVE-2025-31651, CVE-2025-50073, CVE-2025-30759, CVE-2025-27113, CVE-2025-30474, CVE-2024-8184, CVE-2022-45693, CVE-2024-21094, CVE-2024-38820, CVE-2025-30762, CVE-2025-50061, CVE-2024-38828, CVE-2025-27818, CVE-2025-32415, CVE-2025-27819, CVE-2025-50060, CVE-2024-24795, CVE-2024-47072, CVE-2025-50064, CVE-2023-39017, CVE-2024-47561, CVE-2024-6763, CVE-2025-31650, CVE-2025-49146, CVE-2025-50072, CVE-2025-31672, CVE-2025-0725, CVE-2025-30753, CVE-2023-42917, CVE-2024-47554, CVE-2024-39884, CVE-2025-24928, CVE-2024-12798, CVE-2025-32414, CVE-2025-23184, CVE-2025-29482, CVE-2025-27817, CVE-2024-13176, CVE-2024-91432025/7/15development
oracle CPUJul2025: Oracle Analytics ServerCVE-2025-50060, CVE-2025-30065, CVE-2025-48734, CVE-2025-23184, CVE-2025-50061, CVE-2025-307592025/7/15development
oracle CPUJul2025: MySQL Server 9.2.1CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-30760, CVE-2024-37891, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-23016, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: MySQL Cluster 8.4.6CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: MySQL Server 8.0.42CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2024-37891, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: MySQL Server 8.4.6CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: MySQL Server 8.4.5CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2024-37891, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: MySQL Server 9.1.1CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: MySQL Server 9.3.1CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-23016, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-50081, CVE-2025-500992025/7/15development
oracle CPUJul2025: MySQL Cluster 8.0.43CVE-2025-50085, CVE-2025-50083, CVE-2025-50093, CVE-2025-50086, CVE-2025-53032, CVE-2025-50079, CVE-2025-50100, CVE-2025-50098, CVE-2025-50091, CVE-2025-5399, CVE-2025-50094, CVE-2025-50096, CVE-2025-53023, CVE-2025-50080, CVE-2025-50077, CVE-2025-50088, CVE-2025-50089, CVE-2025-50095, CVE-2025-50087, CVE-2025-32415, CVE-2025-50076, CVE-2025-50101, CVE-2025-50097, CVE-2025-50068, CVE-2025-50102, CVE-2025-50103, CVE-2025-0725, CVE-2025-50084, CVE-2025-50104, CVE-2024-9287, CVE-2025-50082, CVE-2025-50078, CVE-2025-50092, CVE-2025-32414, CVE-2025-50081, CVE-2025-500992025/7/15development
juniper JSA100098: JSA100098 : 2025-07 Security Bulletin: Junos OS: SRX Series: J-Web can be exposed on additional interfaces (CVE-2025-6549)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100078: JSA100078 : 2025-07 Security Bulletin: Junos OS: A low-privileged user can disable an interface (CVE-2025-52963)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100092: JSA100092 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: When RIB sharding is configured each time a show command is executed RPD memory leaks (CVE-2025-52986)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100057: JSA100057 : 2025-07 Security Bulletin: Junos OS: Low-privileged user can cause script to run as root, leading to privilege escalation (CVE-2025-30661)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100060: JSA100060 : 2025-07 Security Bulletin: Junos OS Evolved: A low-privileged user can execute CLI commands and modify the configuration compromise the system (CVE-2025-52954)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100080: JSA100080 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Junos OS and Junos OS Evolved: Receipt of a specific BGP UPDATE causes an rpd crash on devices with BGP multipaCVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100088: JSA100088 : 2025-07 Security Bulletin: Junos OS: MX Series: When specific SIP packets are processed the MS-MPC will crash (CVE-2025-52982)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100096: JSA100096 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Annotate configuration command can be used for privilege escalation (CVE-2025-52989)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100058: JSA100058 : 2025-07 Security Bulletin: Junos OS: MX Series with MPC-BUILTIN, MPC 1 through MPC 9: Receipt and processing of a malformed packet causes one or more FPCs to crash (CVE-CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100087: JSA100087 : 2025-07 Security Bulletin:Junos OS: SRX Series: Sequence of specific PIM packets causes a flowd crash (CVE-2025-52981)CVE-2025-52988, CVE-2025-52951, CVE-2024-47503, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52964, CVE-2025-52952, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100055: JSA100055 : 2025-07 Security Bulletin: Junos OS: IPv6 firewall filter fails to match payload-protocol (CVE-2025-52951)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100050: JSA100050 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: With traceoptions enabled, receipt of malformed AS PATH causes RPD crash (CVE-2025-52946)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2024-39549, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100089: JSA100089 : 2025-07 Security Bulletin: Junos OS: After removing ssh public key authentication root can still log in (CVE-2025-52983)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100095: JSA100095 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Privilege escalation via CLI command 'request system logout' (CVE-2025-52988)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100060: JSA100060 : 2025-07 Security Bulletin: Junos OS Evolved: A low-privileged user can execute arbitrary Junos commands and modify the configuration, thereby compromising the system (CVCVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100095: JSA100095 : 2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Privilege escalation to root via CLI command 'request system logout' (CVE-2025-52988)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
juniper JSA100051: JSA100051 : 2025-07 Security Bulletin: Junos OS: ACX Series: When 'hot-standby' mode is configured for an L2 circuit, interface flap causes the FEB to crash (CVE-2025-52947)CVE-2025-52988, CVE-2025-52951, CVE-2025-52949, CVE-2025-52946, CVE-2025-52985, CVE-2025-52982, CVE-2025-52986, CVE-2025-52983, CVE-2025-52947, CVE-2025-52948, CVE-2025-52952, CVE-2025-52964, CVE-2025-52955, CVE-2025-6549, CVE-2025-52984, CVE-2025-52980, CVE-2025-30661, CVE-2025-52989, CVE-2025-52954, CVE-2025-52981, CVE-2025-52963, CVE-2025-52953, CVE-2025-529582025/7/15development
Adobe - APSB25-61 - and EPPM metadata addCVE-2025-272032025/7/11testing
Multiple Vulnerabilities in Siemens Totally Integrated Automation (TIA) Products - TIA AdministratorCVE-2025-27127, CVE-2025-23364, CVE-2025-233652025/7/10development
Multiple Vulnerabilities in Schneider Electric EcoStruxure IT Data Center ExpertCVE-2025-50125, CVE-2025-50123, CVE-2025-50121, CVE-2025-50122, CVE-2025-6438, CVE-2025-501242025/7/9development
PT - Microsoft TeamsCVE-2025-49731, CVE-2025-497372025/7/9development
Security Update for Rubygems REXMLCVE-2024-433982025/6/30development
vendor_unpatched cve-2015-1283: Unpatched CVEs for Debian Linux (cve-2015-1283)CVE-2015-12832025/6/18development
vendor_unpatched cve-2011-10007: Unpatched CVEs for Red Hat Enterprise Linux (cve-2011-10007)CVE-2011-100072025/6/18development
SAP NetWeaver Visual Composer Metadata Uploader Local Detection (CVE-2025-42999)CVE-2025-43006, CVE-2025-43009, CVE-2025-42997, CVE-2025-43010, CVE-2025-30012, CVE-2025-42999, CVE-2025-43007, CVE-2025-43003, CVE-2025-30009, CVE-2025-30010, CVE-2025-26662, CVE-2025-31329, CVE-2025-43008, CVE-2025-43011, CVE-2025-30018, CVE-2025-30011, CVE-2025-43000, CVE-2025-43002, CVE-2025-43004, CVE-2025-31324, CVE-2025-430052025/5/19development
FA plugin updates for vendor_unpatched: 2025/04/06 13:17 chunk 1/1CVE-2025-32365, CVE-2025-323642025/4/10development