CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

tenable

nessus

53 known vulnerabilities · sorted by CVSS score

CVE-2022-23852
CRITICAL9.8

Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.

libexpat_project / libexpat+7
Network
Published Jan 24, 2022
Page 1 of 3
CVE-2022-22824
CRITICAL9.8

defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2022-22822
CRITICAL9.8

addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2022-22823
CRITICAL9.8

build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2023-0101
HIGH8.8

A privilege escalation vulnerability was identified in Nessus versions 8.10.1 through 8.15.8 and 10.0.0 through 10.4.1. An authenticated attacker could potentially execute a specially crafted file to obtain root or NT AUTHORITY / SYSTEM privileges on the Nessus host.

tenable / nessus+1
Network
Published Jan 20, 2023
CVE-2022-4313
HIGH8.8

A vulnerability was reported where through modifying the scan variables, an authenticated user in Tenable products, that has Scan Policy Configuration roles, could manipulate audit policy variables to execute arbitrary commands on credentialed scan targets.

tenable / nessus+1
Network
Published Mar 15, 2023
CVE-2022-22825
HIGH8.8

lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2021-45960
HIGH8.8

In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).

libexpat_project / libexpat+11
Network
Published Jan 1, 2022
CVE-2022-32973
HIGH8.8

An authenticated attacker could create an audit file that bypasses PowerShell cmdlet checks and executes commands with administrator privileges.

tenable / nessus
Network
Published Jun 21, 2022
CVE-2023-0524
HIGH8.8

As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.

tenable / nessus+2
Network
Published Feb 1, 2023
CVE-2022-22826
HIGH8.8

nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2022-22827
HIGH8.8

storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.

libexpat_project / libexpat+5
Network
Published Jan 10, 2022
CVE-2025-36630
HIGH8.4

In Tenable Nessus versions prior to 10.8.5 on a Windows host, it was found that a non-administrative user could overwrite arbitrary local system files with log content at SYSTEM privilege.

tenable / nessus
Local
Published Jul 2, 2025
CVE-2021-46143
HIGH8.1

In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.

libexpat_project / libexpat+10
Network
Published Jan 6, 2022
CVE-2019-3974
HIGH8.1

Nessus 8.5.2 and earlier on Windows platforms were found to contain an issue where certain system files could be overwritten arbitrarily, potentially creating a denial of service condition.

tenable / nessus
Network
Published Aug 15, 2019
CVE-2020-5793
HIGH7.8

A vulnerability in Nessus versions 8.9.0 through 8.12.0 for Windows & Nessus Agent 8.0.0 and 8.1.0 for Windows could allow an authenticated local attacker to copy user-supplied files to a specially constructed path in a specifically named user directory. An attacker could exploit this vulnerability by creating a malicious file and copying the file to a system directory. The attacker needs valid credentials on the Windows system to exploit this vulnerability.

tenable / nessus+2
Local
Published Nov 5, 2020
CVE-2022-0778
HIGH7.5

The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).

openssl / openssl+29
Network
Published Mar 15, 2022
CVE-2017-18214
HIGH7.5

The moment module before 2.19.3 for Node.js is prone to a regular expression denial of service via a crafted date string, a different vulnerability than CVE-2016-4055.

momentjs / moment+1
Network
Published Mar 4, 2018
CVE-2022-23990
HIGH7.5

Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.

libexpat_project / libexpat+8
Network
Published Jan 26, 2022
CVE-2018-20843
HIGH7.5

In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).

libexpat_project / libexpat+18
Network
Published Jun 24, 2019