プラグインの検索

ID名前製品ファミリー公開日更新日深刻度
187971Cisco TelePresence Management Suite < 15.13.6 の XSS (cisco-sa-tms-portal-xss-AXNeVg3s)NessusCISCO2024/1/122025/4/25
medium
188069Atlassian Confluence < 7.19.18 / 8.0.x < 8.5.5 / 8.6.x < 8.7.2 (CONFSERVER-94066)NessusCGI abuses2024/1/162024/6/5
high
189297Splunk Enterprise 9.0.0 < 9.0.8, 9.1.0 < 9.1.3 (SVD-2024-0108)NessusCGI abuses2024/1/222024/4/26
high
189298Splunk Enterprise 9.0.0 < 9.0.8, 9.1.0 < 9.1.3 (SVD-2024-0105)NessusCGI abuses2024/1/222024/4/26
medium
189374Juniper Junos OS の脆弱性 (JSA75758)NessusJunos Local Security Checks2024/1/232024/2/1
medium
189531Cisco Unified Communications Manager RCE (cisco-sa-cucm-rce-bWNzQcUm)NessusCISCO2024/1/252024/2/2
critical
189533Cisco Unified Communications Manager IM & Presence RCE (cisco-sa-cucm-rce-bWNzQcUm)NessusCISCO2024/1/252024/2/2
critical
189592GitLab 12.7 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2023-6159)NessusCGI abuses2024/1/252024/5/17
medium
189593GitLab 14.0 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2024-0456)NessusCGI abuses2024/1/252024/5/3
medium
189594GitLab 16.0 < 16.5.8 / 16.6 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2024-0402)NessusCGI abuses2024/1/252024/5/3
critical
189596GitLab 13.7 < 16.6.6 / 16.7 < 16.7.4 / 16.8 < 16.8.1 (CVE-2023-5933)NessusCGI abuses2024/1/252024/5/17
medium
189764Cisco IOS XE ソフトウェアのレイヤー 2 トンネリングプロトコルの DoS (cisco-sa-ios-xe-l2tp-dos-eB5tuFmV)NessusCISCO2024/1/302024/1/31
high
190357QTS、QuTS hero、および QuTScloud の QNAP QTS / QuTS hero の脆弱性 (QSA-24-02)NessusMisc.2024/2/92024/2/12
medium
190681QTS における QNAP QTS の脆弱性 (QSA-24-01)NessusMisc.2024/2/192024/2/19
medium
190863GitLab 12.0 < 16.7.6 / 16.8 < 16.8.3 / 16.9 < 16.9.1 (CVE-2023-4895)NessusCGI abuses2024/2/212024/5/17
medium
190865GitLab 16.9.0 < 16.9.1 (CVE-2024-1451)NessusCGI abuses2024/2/212024/5/3
high
191465Cisco Nexus 3600 外部 BGP の DoS (cisco-sa-nxos-po-acl-TkyePgvL)NessusCISCO2024/3/12025/2/27
high
191469Cisco NX-OS Software MPLS カプセル化 IPv6 の DoS (cisco-sa-ipv6-mpls-dos-R9ycXkwM)NessusCISCO2024/3/12025/2/27
high
191554IBM WebSphere Application Server Liberty 17.0.0.3 < 24.0.0.3 (7125527)NessusWeb Servers2024/3/52025/8/13
medium
191555Atlassian Confluence 4.1.x < 7.19.17 / 8.0.x < 8.5.4 / 8.6.x < 8.6.2 / 8.7.x < 8.7.2 / 8.8.0 (CONFSERVER-94108)NessusCGI abuses2024/3/52024/6/5
high
192031Palo Alto Networks PAN-OS 9.0.x < 9.0.17-h4 / 9.1.x < 9.1.17 / 10.1.x < 10.1.12 / 10.2.x < 10.2.8 / 11.0.x < 11.0.3 の脆弱性NessusPalo Alto Local Security Checks2024/3/132026/2/2
low
192108Cisco IOS XR Software の認証 CLI SCP/SFTP の DoS (cisco-sa-iosxr-scp-dos-kb6sUUHw)NessusCISCO2024/3/142024/9/13
medium
192465Cisco IOS XR ソフトウェアの SSH 権限昇格 (cisco-sa-iosxr-ssh-privesc-eWDMKew3)NessusCISCO2024/3/222024/9/13
high
193424Apache 2.4.x < 2.4.54 の複数の脆弱性 (mod_lua)NessusWeb Servers2024/4/172024/4/18
high
193487Juniper Junos OS の脆弱性 (JSA75757)NessusJunos Local Security Checks2024/4/182024/4/18
high
193490Juniper Junos OS の脆弱性 (JSA75754)NessusJunos Local Security Checks2024/4/182024/10/28
medium
193491Juniper Junos OS の脆弱性 (JSA75742)NessusJunos Local Security Checks2024/4/182024/4/18
medium
193492Juniper Junos OS の脆弱性 (JSA75743)NessusJunos Local Security Checks2024/4/182024/4/18
high
193584Cisco IOS XE ソフトウェアの SNMP Extended Named アクセスコントロールリストのバイパス (cisco-sa-snmp-uwBXfqww)NessusCISCO2024/4/192024/9/27
medium
193953Splunk Enterprise 9.0.0 < 9.0.4 (SVD-2023-0202)NessusCGI abuses2024/4/262024/4/26
medium
194815GitLab 16.9 < 16.9.6 / 16.10 < 16.10.4 / 16.11 < 16.11.1 (CVE-2024-2434)NessusCGI abuses2024/4/302024/12/13
high
194816GitLab < 16.9.6 / 16.10 < 16.10.4 / 16.11 < 16.11.1 (CVE-2024-1347)NessusCGI abuses2024/4/302024/12/13
medium
194818GitLab 12.5 < 16.9.6 / 16.10 < 16.10.4 / 16.11 < 16.11.1 (CVE-2024-2829)NessusCGI abuses2024/4/302024/5/31
high
194909Atlassian Confluence < 7.19.20 / 7.20.x < 8.5.7 / 8.6.x < 8.9.0 (CONFSERVER-95099)NessusCGI abuses2024/5/22024/6/5
high
194924Splunk Enterprise 8.1 < 8.1.13、8.2.0 < 8.2.10、9.0.0 < 9.0.4 (SVD-2023-0215)NessusCGI abuses2024/5/22024/5/2
high
194925Splunk Enterprise 9.0.0 < 9.0.7、9.1.0 < 9.1.2 (SVD-2023-1105)NessusCGI abuses2024/5/22025/5/12
high
194957GitLab 16.1 < 16.7.6 / 16.8 < 16.8.3 / 16.9 < 16.9.1 (CVE-2024-1525)NessusCGI abuses2024/5/32024/5/3
medium
197304GitLab 13.8 < 13.8.5 / 13.9 < 13.9.2 (CVE-2021-22185)NessusCGI abuses2024/5/172024/5/17
medium
197306GitLab 12.10 < 13.2.10 / 13.3 < 13.3.7 / 13.4 < 13.4.2 (CVE-2020-13339)NessusCGI abuses2024/5/172024/5/17
medium
197309GitLab 15.11 < 16.1.5 / 16.2 < 16.2.5 / 16.3 < 16.3.1 (CVE-2023-3210)NessusCGI abuses2024/5/172024/5/17
medium
197311GitLab 13.9 < 13.11.6 / 13.12 < 13.12.6 / 14.0 < 14.0.2 (CVE-2021-22226)NessusCGI abuses2024/5/172024/5/17
medium
197312GitLab < 15.1.6 (CVE-2022-3030)NessusCGI abuses2024/5/172024/5/17
medium
197313GitLab 11.3 < 14.1.7 / 14.2 < 14.2.5 / 14.3 < 14.3.1 (CVE-2021-39876)NessusCGI abuses2024/5/172024/5/17
medium
197315GitLab 8.4 < 13.0.12 / 13.1 < 13.1.6 / 13.2 < 13.2.3 (CVE-2020-13290)NessusCGI abuses2024/5/172024/5/17
high
197316GitLab 11.8 < 12.10.13 (CVE-2020-13336)NessusCGI abuses2024/5/172024/5/17
medium
197319GitLab 8.7 < 13.1.10 / 13.2 < 13.2.8 / 13.3 < 13.3.4 (CVE-2020-13289)NessusCGI abuses2024/5/172024/5/17
medium
197351GitLab 12.8 < 13.6.6 / 13.7.0 < 13.7.6 / 13.8.0 < 13.8.2 (CVE-2021-22184)NessusCGI abuses2024/5/172024/5/17
medium
197352GitLab 12.8 < 13.6.6 / 13.7.0 < 13.7.6 / 13.8.0 < 13.8.2 (CVE-2021-22172)NessusCGI abuses2024/5/172024/5/17
medium
197355GitLab 8.14 < 13.3.9 / 13.4 < 13.4.5 / 13.5 < 13.5.2 (CVE-2020-13355)NessusCGI abuses2024/5/172024/5/17
high
197357GitLab 8.16 < 12.10.13 / 13.0 < 13.0.8 / 13.1 < 13.1.2 (CVE-2020-13319)NessusCGI abuses2024/5/172024/5/17
medium