CVEs

Tenable maintains a list of Common Vulnerabilities and Exposures (CVEs) and their affected products. Tenable augments the data to include related Tenable Plugins that detect each vulnerability. 315777 CVEs are indexed from NVD.

Search

Vulnerability Watch ›

  • CVE-2025-61884
    highVulnerability of Interest

    This Oracle E-Business Suite flaw was reportedly exploited in the wild and connected to a leaked proof-of-concept exploit from Scattered Lapsus$ Hunters or ShinyHunters.

  • CVE-2025-20352
    highVulnerability of Interest

    Exploitation has been observed in order to distribute malware. Patches are available and should be applied as soon as possible.

  • CVE-2025-54253
    criticalVulnerability of Interest

    Public exploit code has been released for an exploit chain targeting Adobe Experience Manager Forms and exploitation has been observed. Immediate patching is recommended

  • CVE-2017-3881
    criticalVulnerability of Interest

    Exploitation has been observed in order to distribute malware. Patches are available and should be applied as soon as possible.

  • CVE-2025-61990
    highVulnerability Being Monitored

    F5 Networks confirmed a threat actor gained access to its network and stole BIG-IP source code. We have flagged the following CVEs as being monitored for further intel.

  • CVE-2025-61935
    highVulnerability Being Monitored

    F5 Networks confirmed a threat actor gained access to its network and stole BIG-IP source code. We have flagged the following CVEs as being monitored for further intel.

  • CVE-2025-58071
    highVulnerability Being Monitored

    F5 Networks confirmed a threat actor gained access to its network and stole BIG-IP source code. We have flagged the following CVEs as being monitored for further intel.

  • CVE-2025-61974
    highVulnerability Being Monitored

    F5 Networks confirmed a threat actor gained access to its network and stole BIG-IP source code. We have flagged the following CVEs as being monitored for further intel.

  • CVE-2025-61960
    highVulnerability Being Monitored

    F5 Networks confirmed a threat actor gained access to its network and stole BIG-IP source code. We have flagged the following CVEs as being monitored for further intel.

  • CVE-2025-61958
    highVulnerability Being Monitored

    F5 Networks confirmed a threat actor gained access to its network and stole BIG-IP source code. We have flagged the following CVEs as being monitored for further intel.

Newest ›

  • The All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0 via the 'aio_time_clock_lite_js' AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber access and above, to clock other users in and out.

  • Connection desynchronization between an HTTP proxy and the model backend. The fixes were rolled out for all proxies in front of impacted models by 2025-09-28. Users do not need to take any action.

  • Encrypted WiFi and SSH credentials were found in the Ghost Robotics Vision 60 v0.27.2 APK. This vulnerability allows an attacker to connect to the robot's WiFi and view all its data, as it runs on ROS 2 without default authentication. In addition, the attacker can connect via SSH and gain full control of the robot, which could cause physical damage to the robot itself or its environment.

  • Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with regard to network connectivity, the robot's internal router automatically assigns IP addresses to any device physically connected to it. An attacker could connect a WiFi access point under their control to gain access to the robot's network without needing the credentials for the deployed network. Once inside, the attacker can monitor all its data, as the robot runs on ROS 2 without authentication by default.

  • The communication protocol implemented in Ghost Robotics Vision 60 v0.27.2 could allow an attacker to send commands to the robot from an external attack station, impersonating the control station (tablet) and gaining unauthorised full control of the robot. The absence of encryption and authentication mechanisms in the communication protocol allows an attacker to capture legitimate traffic between the robot and the controller, replicate it, and send any valid command to the robot from any attacking computer or device. The communication protocol used in this interface is based on MAVLink, a widely documented protocol, which increases the likelihood of attack. There are two methods for connecting to the robot remotely: Wi-Fi and 4G/LTE.

  • Stored Cross-site Scripting (XSS) in Oct8ne Chatbot v2.3. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by injecting a malicious payload through the creation of a transcript that is sent by email. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user, through /Records/SendSummaryMail.

  • The Responsive Progress Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's rprogress shortcode in versions less than, or equal to, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

  • The SM CountDown Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's smcountdown shortcode in versions less than, or equal to, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

  • The ST Categories Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's st-categories shortcode in versions less than, or equal to, 1.0.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

  • The Material Design Iconic Font Integration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mdiconic' shortcode in all versions up to, and including, 2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

Updated ›

  • There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1

  • The All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0 via the 'aio_time_clock_lite_js' AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with subscriber access and above, to clock other users in and out.

  • Mercku M6a devices through 2.1.0 allow root TELNET logins via the web admin password.

  • On Mercku M6a devices through 2.1.0, the authentication system uses predictable session tokens based on timestamps.

  • Mercku M6a devices through 2.1.0 allow TELNET sessions via a router.telnet.enabled.update request by an administrator.

  • On Mercku M6a devices through 2.1.0, session tokens remain valid for at least months in some cases.

  • Mercku M6a devices through 2.1.0 allow password changes via intranet CSRF attacks.

  • The Meta Tag Manager WordPress plugin before 3.3 does not restrict which roles can create http-equiv refresh meta tags.

  • A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.

  • Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.