CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “tenable”

138 vulnerabilities found for “tenable”

Page 1 of 7

CVE-2022-23990
HIGH7.5

Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.

libexpat_project / libexpat+8
Network
Published Jan 26, 2022
Page 1 of 7
CVE-2022-23852
CRITICAL9.8

Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.

libexpat_project / libexpat+7
Network
Published Jan 24, 2022
CVE-2022-22825
HIGH8.8

lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2022-22824
CRITICAL9.8

defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2022-22823
CRITICAL9.8

build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2022-22826
HIGH8.8

nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2022-22827
HIGH8.8

storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2022-22822
CRITICAL9.8

addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2021-46143
HIGH8.1

In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.

libexpat_project / libexpat+10
Network
Published Jan 6, 2022
CVE-2021-45960
HIGH8.8

In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).

libexpat_project / libexpat+11
Network
Published Jan 1, 2022
CVE-2021-20135
MEDIUM6.7

Nessus versions 8.15.2 and earlier were found to contain a local privilege escalation vulnerability which could allow an authenticated, local administrator to run specific executables on the Nessus Agent host. Tenable has included a fix for this issue in Nessus 10.0.0. The installation files can be obtained from the Tenable Downloads Portal (https://www.tenable.com/downloads/nessus).

tenable / nessus
Local
Published Nov 3, 2021
CVE-2021-20106
MEDIUM6.5

Nessus Agent versions 8.2.5 and earlier were found to contain a privilege escalation vulnerability which could allow a Nessus administrator user to upload a specially crafted file that could lead to gaining administrator privileges on the Nessus host.

tenable / nessus
Local
Published Jul 21, 2021
CVE-2021-20079
MEDIUM6.7

Nessus versions 8.13.2 and earlier were found to contain a privilege escalation vulnerability which could allow a Nessus administrator user to upload a specially crafted file that could lead to gaining administrator privileges on the Nessus host.

tenable / nessus
Local
Published Jun 29, 2021
CVE-2021-20099
MEDIUM6.7

Nessus Agent 8.2.4 and earlier for Windows were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific Windows executables as the Nessus host. This is different than CVE-2021-20100.

tenable / nessus
Local
Published Jun 28, 2021
CVE-2021-20100
MEDIUM6.7

Nessus Agent 8.2.4 and earlier for Windows were found to contain multiple local privilege escalation vulnerabilities which could allow an authenticated, local administrator to run specific Windows executables as the Nessus host. This is different than CVE-2021-20099.

tenable / nessus
Local
Published Jun 28, 2021
CVE-2021-3450
HIGH7.4

The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).

openssl / openssl+52
Network
Published Mar 25, 2021
CVE-2021-3449
MEDIUM5.9

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

openssl / openssl+142
Network
Published Mar 25, 2021
CVE-2020-5793
HIGH7.8

A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.

tenable / nessus+2
Local
Published Nov 5, 2020
CVE-2020-5774
HIGH7.1

Nessus versions 8.11.0 and earlier were found to maintain sessions longer than the permitted period in certain scenarios. The lack of proper session expiration could allow attackers with local access to login into an existing browser session.

tenable / nessus
Local
Published Aug 21, 2020
CVE-2020-5765
MEDIUM5.4

Nessus 8.10.0 and earlier were found to contain a Stored XSS vulnerability due to improper validation of input during scan configuration. An authenticated, remote attacker could potentially exploit this vulnerability to execute arbitrary code in a user's session. Tenable has implemented additional input validation mechanisms to correct this issue in Nessus 8.11.0.

tenable / nessus
Network
Published Jul 15, 2020