<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Newest Nessus Network Monitor Plugins from Tenable</title>
        <link>https://www.tenable.com/plugins/feeds?sort=newest&amp;type=nnm</link>
        <description>Get the latest plugin updates from Tenable</description>
        <lastBuildDate>Tue, 17 Mar 2026 09:38:02 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Tenable Plugins</generator>
        <image>
            <title>Newest Nessus Network Monitor Plugins from Tenable</title>
            <url>https://www.tenable.com/themes/custom/tenable/img/favicons/apple-touch-icon.png</url>
            <link>https://www.tenable.com/plugins/feeds?sort=newest&amp;type=nnm</link>
        </image>
        <copyright>Copyright 2026 Tenable, Inc. All rights reserved.</copyright>
        <atom:link href="https://www.tenable.com/plugins/feeds?sort=newest&amp;type=nnm" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[Assembly AI API Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701501</link>
            <guid>https://www.tenable.com/plugins/nnm/701501</guid>
            <pubDate>Tue, 04 Feb 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701501 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Assembly AI.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701501">https://www.tenable.com/plugins/nnm/701501</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Granola Notes Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701500</link>
            <guid>https://www.tenable.com/plugins/nnm/701500</guid>
            <pubDate>Thu, 30 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701500 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Granola AI.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701500">https://www.tenable.com/plugins/nnm/701500</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Granola API Web Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701499</link>
            <guid>https://www.tenable.com/plugins/nnm/701499</guid>
            <pubDate>Thu, 30 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701499 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Granola AI.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701499">https://www.tenable.com/plugins/nnm/701499</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Deepseek Chat Web Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701498</link>
            <guid>https://www.tenable.com/plugins/nnm/701498</guid>
            <pubDate>Tue, 28 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701498 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using the DeepSeek Chat. <br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701498">https://www.tenable.com/plugins/nnm/701498</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0-M1 < 9.0.96 / 9.0.92 < 9.0.96 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701495</link>
            <guid>https://www.tenable.com/plugins/nnm/701495</guid>
            <pubDate>Mon, 18 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701495 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 9.0.0-M1 < 9.0.96 / 9.0.92 < 9.0.96. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_9.0.96_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.96 / 9.0.96 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701495">https://www.tenable.com/plugins/nnm/701495</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.27 < 10.1.31 / 10.1.0-M1 < 10.1.31 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701494</link>
            <guid>https://www.tenable.com/plugins/nnm/701494</guid>
            <pubDate>Mon, 18 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701494 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 10.1.27 < 10.1.31 / 10.1.0-M1 < 10.1.31. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.1.31_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.31 / 10.1.31 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701494">https://www.tenable.com/plugins/nnm/701494</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0-M1 < 11.0.0 / 11.0.0-M23 < 11.0.0 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701493</link>
            <guid>https://www.tenable.com/plugins/nnm/701493</guid>
            <pubDate>Mon, 18 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701493 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is 11.0.0-M1 < 11.0.0 / 11.0.0-M23 < 11.0.0. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_11.0.0_security-11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.0 / 11.0.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701493">https://www.tenable.com/plugins/nnm/701493</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.97 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701492</link>
            <guid>https://www.tenable.com/plugins/nnm/701492</guid>
            <pubDate>Mon, 18 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701492 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.97. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.97_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.97 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701492">https://www.tenable.com/plugins/nnm/701492</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.33 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701491</link>
            <guid>https://www.tenable.com/plugins/nnm/701491</guid>
            <pubDate>Mon, 18 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701491 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.33. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.33_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.33 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701491">https://www.tenable.com/plugins/nnm/701491</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 11.0.1 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701490</link>
            <guid>https://www.tenable.com/plugins/nnm/701490</guid>
            <pubDate>Mon, 18 Nov 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701490 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 11.0.1. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_11.0.1_security-11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701490">https://www.tenable.com/plugins/nnm/701490</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Google Gemini API Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701488</link>
            <guid>https://www.tenable.com/plugins/nnm/701488</guid>
            <pubDate>Wed, 25 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701488 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Google Gemini API. Gemini API is an LLM model from Google.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701488">https://www.tenable.com/plugins/nnm/701488</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Claude Sonnet API Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701487</link>
            <guid>https://www.tenable.com/plugins/nnm/701487</guid>
            <pubDate>Wed, 25 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701487 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Claude Sonnet API. Claude Sonnet is an LLM model from Anthropic.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701487">https://www.tenable.com/plugins/nnm/701487</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Perplexity Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701489</link>
            <guid>https://www.tenable.com/plugins/nnm/701489</guid>
            <pubDate>Mon, 23 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701489 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Perplexity. Perplexity is an LLM.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701489">https://www.tenable.com/plugins/nnm/701489</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM IBM watsonx Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701486</link>
            <guid>https://www.tenable.com/plugins/nnm/701486</guid>
            <pubDate>Mon, 23 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701486 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using IBM watsonx. Watsonx is IBM's commercial generative AI and scientific data platform.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701486">https://www.tenable.com/plugins/nnm/701486</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Clarifai Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701485</link>
            <guid>https://www.tenable.com/plugins/nnm/701485</guid>
            <pubDate>Mon, 23 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701485 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Clarifai. Clarifai provides AI model, application, module and workflow services.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701485">https://www.tenable.com/plugins/nnm/701485</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Matroid AI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701484</link>
            <guid>https://www.tenable.com/plugins/nnm/701484</guid>
            <pubDate>Mon, 23 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701484 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Matroid. Matroid provides computer vision services.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701484">https://www.tenable.com/plugins/nnm/701484</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Bettybot Domain Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701483</link>
            <guid>https://www.tenable.com/plugins/nnm/701483</guid>
            <pubDate>Mon, 23 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701483 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Bettybot. Bettybot is an AI chatbot unitilizing an existing organizational knowledge base.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701483">https://www.tenable.com/plugins/nnm/701483</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 18 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701482</link>
            <guid>https://www.tenable.com/plugins/nnm/701482</guid>
            <pubDate>Tue, 17 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701482 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 18. It is, therefore, affected by multiple vulnerabilities as referenced in the 121241 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 18 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701482">https://www.tenable.com/plugins/nnm/701482</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Read.AI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701480</link>
            <guid>https://www.tenable.com/plugins/nnm/701480</guid>
            <pubDate>Wed, 11 Sep 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701480 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using Read.AI. Read.AI provides meeting transcription services.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701480">https://www.tenable.com/plugins/nnm/701480</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 17.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701477</link>
            <guid>https://www.tenable.com/plugins/nnm/701477</guid>
            <pubDate>Tue, 30 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701477 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 17.6. It is, therefore, affected by multiple vulnerabilities as referenced in the HT214121 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 17.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701477">https://www.tenable.com/plugins/nnm/701477</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Deepseek API Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701497</link>
            <guid>https://www.tenable.com/plugins/nnm/701497</guid>
            <pubDate>Wed, 24 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701497 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using the DeepSeek API. <br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701497">https://www.tenable.com/plugins/nnm/701497</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM OpenAI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701481</link>
            <guid>https://www.tenable.com/plugins/nnm/701481</guid>
            <pubDate>Wed, 24 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701481 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using the OpenAI API. <br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701481">https://www.tenable.com/plugins/nnm/701481</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Systran Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701479</link>
            <guid>https://www.tenable.com/plugins/nnm/701479</guid>
            <pubDate>Wed, 24 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701479 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using the Systran API. Systran provides translation services.<br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701479">https://www.tenable.com/plugins/nnm/701479</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AI/LLM Google Vertex AI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701478</link>
            <guid>https://www.tenable.com/plugins/nnm/701478</guid>
            <pubDate>Wed, 24 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701478 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Traffic observed from the remote host indicates a potential violation of company policy. <br /></span>
      <h3>Description</h3>
      <span>The remote host has been observed using the Google Vertex AI API or model registry. <br /></span>
      <h3>Solution</h3>
      <span>Ensure that such behavior is in alignment with corporate policies and guidelines.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701478">https://www.tenable.com/plugins/nnm/701478</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ZenML Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701476</link>
            <guid>https://www.tenable.com/plugins/nnm/701476</guid>
            <pubDate>Thu, 18 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701476 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Detects a ZenML application.<br /></span>
      <h3>Description</h3>
      <span>The remote host is running a ZenML webapp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701476">https://www.tenable.com/plugins/nnm/701476</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ray Dashboard Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701475</link>
            <guid>https://www.tenable.com/plugins/nnm/701475</guid>
            <pubDate>Thu, 18 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701475 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Detects a Ray Dashboard application.<br /></span>
      <h3>Description</h3>
      <span>The remote host is running a Ray Dashboard webapp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701475">https://www.tenable.com/plugins/nnm/701475</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NextChat / ChatGPT Next Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701474</link>
            <guid>https://www.tenable.com/plugins/nnm/701474</guid>
            <pubDate>Thu, 18 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701474 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A NextChat webapp exists on the remote host.<br /></span>
      <h3>Description</h3>
      <span>The remote host is running a NextChat webapp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701474">https://www.tenable.com/plugins/nnm/701474</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[H2O Flow Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/701473</link>
            <guid>https://www.tenable.com/plugins/nnm/701473</guid>
            <pubDate>Thu, 18 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701473 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>The remote web server is a H2O Flow platform.<br /></span>
      <h3>Description</h3>
      <span>The remote web server hosts H2O Flow web application.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701473">https://www.tenable.com/plugins/nnm/701473</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.90 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701472</link>
            <guid>https://www.tenable.com/plugins/nnm/701472</guid>
            <pubDate>Thu, 04 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701472 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.90. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.90_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.90 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701472">https://www.tenable.com/plugins/nnm/701472</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 11.0.0-M21 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701471</link>
            <guid>https://www.tenable.com/plugins/nnm/701471</guid>
            <pubDate>Thu, 04 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701471 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 11.0.0-M21. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_11.0.0-m21_security-11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.0-M21 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701471">https://www.tenable.com/plugins/nnm/701471</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.25 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701470</link>
            <guid>https://www.tenable.com/plugins/nnm/701470</guid>
            <pubDate>Thu, 04 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701470 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.25. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.25_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.25 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701470">https://www.tenable.com/plugins/nnm/701470</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 17.5 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701469</link>
            <guid>https://www.tenable.com/plugins/nnm/701469</guid>
            <pubDate>Mon, 13 May 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701469 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 17.5. It is, therefore, affected by a vulnerability as referenced in the HT214103 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 17.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701469">https://www.tenable.com/plugins/nnm/701469</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.99 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701468</link>
            <guid>https://www.tenable.com/plugins/nnm/701468</guid>
            <pubDate>Wed, 13 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701468 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.99. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_8.5.99_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.99 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701468">https://www.tenable.com/plugins/nnm/701468</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.86 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701467</link>
            <guid>https://www.tenable.com/plugins/nnm/701467</guid>
            <pubDate>Wed, 13 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701467 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.86. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_9.0.86_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.86 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701467">https://www.tenable.com/plugins/nnm/701467</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.19 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701466</link>
            <guid>https://www.tenable.com/plugins/nnm/701466</guid>
            <pubDate>Wed, 13 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701466 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.19. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.1.19_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.19 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701466">https://www.tenable.com/plugins/nnm/701466</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 11.0.0-M17 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701465</link>
            <guid>https://www.tenable.com/plugins/nnm/701465</guid>
            <pubDate>Wed, 13 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701465 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 11.0.0-M17. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_11.0.0-m17_security-11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.0-M17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701465">https://www.tenable.com/plugins/nnm/701465</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 17.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701464</link>
            <guid>https://www.tenable.com/plugins/nnm/701464</guid>
            <pubDate>Thu, 07 Mar 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701464 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 17.4. It is, therefore, affected by multiple vulnerabilities as referenced in the HT214089 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 17.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701464">https://www.tenable.com/plugins/nnm/701464</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 13.1.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701463</link>
            <guid>https://www.tenable.com/plugins/nnm/701463</guid>
            <pubDate>Mon, 19 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701463 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 13.1.2. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211292 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 13.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701463">https://www.tenable.com/plugins/nnm/701463</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 14.0 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701462</link>
            <guid>https://www.tenable.com/plugins/nnm/701462</guid>
            <pubDate>Mon, 12 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701462 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 14.0. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211845 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 14.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701462">https://www.tenable.com/plugins/nnm/701462</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 13.0.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701461</link>
            <guid>https://www.tenable.com/plugins/nnm/701461</guid>
            <pubDate>Mon, 05 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701461 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 13.0.5. It is, therefore, affected by multiple vulnerabilities as referenced in the HT210922 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 13.0.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701461">https://www.tenable.com/plugins/nnm/701461</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 13.1.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701460</link>
            <guid>https://www.tenable.com/plugins/nnm/701460</guid>
            <pubDate>Mon, 05 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701460 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 13.1.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211177 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 13.1.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701460">https://www.tenable.com/plugins/nnm/701460</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 13.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701459</link>
            <guid>https://www.tenable.com/plugins/nnm/701459</guid>
            <pubDate>Mon, 05 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701459 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 13.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211104 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 13.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701459">https://www.tenable.com/plugins/nnm/701459</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701458</link>
            <guid>https://www.tenable.com/plugins/nnm/701458</guid>
            <pubDate>Mon, 05 Feb 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701458 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16.3. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213638 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701458">https://www.tenable.com/plugins/nnm/701458</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 17.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701457</link>
            <guid>https://www.tenable.com/plugins/nnm/701457</guid>
            <pubDate>Tue, 23 Jan 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701457 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 17.3. It is, therefore, affected by multiple vulnerabilities as referenced in the HT214056 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 17.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701457">https://www.tenable.com/plugins/nnm/701457</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 17.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701456</link>
            <guid>https://www.tenable.com/plugins/nnm/701456</guid>
            <pubDate>Mon, 11 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701456 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 17.2. It is, therefore, affected by multiple vulnerabilities as referenced in the HT214039 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 17.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701456">https://www.tenable.com/plugins/nnm/701456</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 17.1.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701455</link>
            <guid>https://www.tenable.com/plugins/nnm/701455</guid>
            <pubDate>Fri, 01 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701455 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 17.1.2. It is, therefore, affected by multiple vulnerabilities as referenced in the HT214033 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 17.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701455">https://www.tenable.com/plugins/nnm/701455</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.96 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701454</link>
            <guid>https://www.tenable.com/plugins/nnm/701454</guid>
            <pubDate>Tue, 28 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701454 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.96. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.96_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.96 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701454">https://www.tenable.com/plugins/nnm/701454</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.83 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701453</link>
            <guid>https://www.tenable.com/plugins/nnm/701453</guid>
            <pubDate>Tue, 28 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701453 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.83. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.83_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.83 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701453">https://www.tenable.com/plugins/nnm/701453</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.16 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701452</link>
            <guid>https://www.tenable.com/plugins/nnm/701452</guid>
            <pubDate>Tue, 28 Nov 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701452 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.16. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.16_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701452">https://www.tenable.com/plugins/nnm/701452</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 17.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701451</link>
            <guid>https://www.tenable.com/plugins/nnm/701451</guid>
            <pubDate>Wed, 25 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701451 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 17.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213986 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 17.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701451">https://www.tenable.com/plugins/nnm/701451</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.14 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701450</link>
            <guid>https://www.tenable.com/plugins/nnm/701450</guid>
            <pubDate>Tue, 10 Oct 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701450 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.14. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.1.14_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.14 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701450">https://www.tenable.com/plugins/nnm/701450</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 17 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701449</link>
            <guid>https://www.tenable.com/plugins/nnm/701449</guid>
            <pubDate>Wed, 27 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701449 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 17. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213941 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701449">https://www.tenable.com/plugins/nnm/701449</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16.6.1 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701448</link>
            <guid>https://www.tenable.com/plugins/nnm/701448</guid>
            <pubDate>Thu, 21 Sep 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701448 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16.6.1. It is, therefore, affected by a vulnerability as referenced in the HT213930 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16.6.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701448">https://www.tenable.com/plugins/nnm/701448</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.93 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701447</link>
            <guid>https://www.tenable.com/plugins/nnm/701447</guid>
            <pubDate>Fri, 25 Aug 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701447 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.93. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.93_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.93 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701447">https://www.tenable.com/plugins/nnm/701447</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.80 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701446</link>
            <guid>https://www.tenable.com/plugins/nnm/701446</guid>
            <pubDate>Fri, 25 Aug 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701446 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.80. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.80_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.80 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701446">https://www.tenable.com/plugins/nnm/701446</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 11.0.0-M11 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701445</link>
            <guid>https://www.tenable.com/plugins/nnm/701445</guid>
            <pubDate>Fri, 25 Aug 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701445 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 11.0.0-M11. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_11.0.0-m11_security-11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.0-M11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701445">https://www.tenable.com/plugins/nnm/701445</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.13 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701444</link>
            <guid>https://www.tenable.com/plugins/nnm/701444</guid>
            <pubDate>Fri, 25 Aug 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701444 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.13. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.13_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.13 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701444">https://www.tenable.com/plugins/nnm/701444</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701443</link>
            <guid>https://www.tenable.com/plugins/nnm/701443</guid>
            <pubDate>Mon, 24 Jul 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701443 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16.6. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213847 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701443">https://www.tenable.com/plugins/nnm/701443</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16.5.2 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701442</link>
            <guid>https://www.tenable.com/plugins/nnm/701442</guid>
            <pubDate>Wed, 12 Jul 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701442 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16.5.2. It is, therefore, affected by a vulnerability as referenced in the HT213826 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16.5.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701442">https://www.tenable.com/plugins/nnm/701442</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16.5.1 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701441</link>
            <guid>https://www.tenable.com/plugins/nnm/701441</guid>
            <pubDate>Thu, 22 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701441 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16.5.1. It is, therefore, affected by a vulnerability as referenced in the HT213816 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16.5.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701441">https://www.tenable.com/plugins/nnm/701441</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.89 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701440</link>
            <guid>https://www.tenable.com/plugins/nnm/701440</guid>
            <pubDate>Wed, 21 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701440 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.89. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.89_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.89 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701440">https://www.tenable.com/plugins/nnm/701440</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.9 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701439</link>
            <guid>https://www.tenable.com/plugins/nnm/701439</guid>
            <pubDate>Wed, 21 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701439 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.9. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.9_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701439">https://www.tenable.com/plugins/nnm/701439</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.75 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701438</link>
            <guid>https://www.tenable.com/plugins/nnm/701438</guid>
            <pubDate>Wed, 21 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701438 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.75. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.75_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.75 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701438">https://www.tenable.com/plugins/nnm/701438</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 11.0.0-M6 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701437</link>
            <guid>https://www.tenable.com/plugins/nnm/701437</guid>
            <pubDate>Wed, 21 Jun 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701437 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 11.0.0-M6. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_11.0.0-m6_security-11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.0-M6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701437">https://www.tenable.com/plugins/nnm/701437</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.18 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701436</link>
            <guid>https://www.tenable.com/plugins/nnm/701436</guid>
            <pubDate>Wed, 24 May 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701436 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.18. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.18_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.18 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701436">https://www.tenable.com/plugins/nnm/701436</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701435</link>
            <guid>https://www.tenable.com/plugins/nnm/701435</guid>
            <pubDate>Fri, 19 May 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701435 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16.5. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213762 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701435">https://www.tenable.com/plugins/nnm/701435</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.84 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701434</link>
            <guid>https://www.tenable.com/plugins/nnm/701434</guid>
            <pubDate>Tue, 03 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701434 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.84. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.84_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.84 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701434">https://www.tenable.com/plugins/nnm/701434</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.69 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701433</link>
            <guid>https://www.tenable.com/plugins/nnm/701433</guid>
            <pubDate>Tue, 03 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701433 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.69. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.69_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.69 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701433">https://www.tenable.com/plugins/nnm/701433</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.2 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701432</link>
            <guid>https://www.tenable.com/plugins/nnm/701432</guid>
            <pubDate>Tue, 03 Jan 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701432 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.2. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.2_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701432">https://www.tenable.com/plugins/nnm/701432</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701431</link>
            <guid>https://www.tenable.com/plugins/nnm/701431</guid>
            <pubDate>Tue, 13 Dec 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701431 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16.2. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213537 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701431">https://www.tenable.com/plugins/nnm/701431</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 107.0.5304.110 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701430</link>
            <guid>https://www.tenable.com/plugins/nnm/701430</guid>
            <pubDate>Tue, 08 Nov 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701430 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 107.0.5304.110. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_11_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 107.0.5304.110 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701430">https://www.tenable.com/plugins/nnm/701430</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 107.0.5304.87 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701429</link>
            <guid>https://www.tenable.com/plugins/nnm/701429</guid>
            <pubDate>Thu, 27 Oct 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701429 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 107.0.5304.87. It is, therefore, affected by a vulnerability as referenced in the 2022_10_stable-channel-update-for-desktop_27 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 107.0.5304.87 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701429">https://www.tenable.com/plugins/nnm/701429</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 107.0.5304.62 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701428</link>
            <guid>https://www.tenable.com/plugins/nnm/701428</guid>
            <pubDate>Tue, 25 Oct 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701428 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 107.0.5304.62. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_10_stable-channel-update-for-desktop_25 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 107.0.5304.62 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701428">https://www.tenable.com/plugins/nnm/701428</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701427</link>
            <guid>https://www.tenable.com/plugins/nnm/701427</guid>
            <pubDate>Mon, 24 Oct 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701427 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213495 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701427">https://www.tenable.com/plugins/nnm/701427</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 106.0.5249.119 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701426</link>
            <guid>https://www.tenable.com/plugins/nnm/701426</guid>
            <pubDate>Wed, 12 Oct 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701426 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 106.0.5249.119. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_10_stable-channel-update-for-desktop_11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 106.0.5249.119 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701426">https://www.tenable.com/plugins/nnm/701426</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.78 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701425</link>
            <guid>https://www.tenable.com/plugins/nnm/701425</guid>
            <pubDate>Wed, 28 Sep 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701425 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.78. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.78_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.78 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701425">https://www.tenable.com/plugins/nnm/701425</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.62 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701424</link>
            <guid>https://www.tenable.com/plugins/nnm/701424</guid>
            <pubDate>Wed, 28 Sep 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701424 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.62. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.62_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.62 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701424">https://www.tenable.com/plugins/nnm/701424</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 106.0.5249.61 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701423</link>
            <guid>https://www.tenable.com/plugins/nnm/701423</guid>
            <pubDate>Tue, 27 Sep 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701423 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 106.0.5249.61. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_09_stable-channel-update-for-desktop_27 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 106.0.5249.61 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701423">https://www.tenable.com/plugins/nnm/701423</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 105.0.5195.125 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701422</link>
            <guid>https://www.tenable.com/plugins/nnm/701422</guid>
            <pubDate>Wed, 14 Sep 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701422 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 105.0.5195.125. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_09_stable-channel-update-for-desktop_14 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 105.0.5195.125 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701422">https://www.tenable.com/plugins/nnm/701422</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701421</link>
            <guid>https://www.tenable.com/plugins/nnm/701421</guid>
            <pubDate>Tue, 13 Sep 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701421 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 16. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213442 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701421">https://www.tenable.com/plugins/nnm/701421</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 105.0.5195.102 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701420</link>
            <guid>https://www.tenable.com/plugins/nnm/701420</guid>
            <pubDate>Fri, 02 Sep 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701420 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 105.0.5195.102. It is, therefore, affected by a vulnerability as referenced in the 2022_09_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 105.0.5195.102 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701420">https://www.tenable.com/plugins/nnm/701420</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 105.0.5195.52 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701419</link>
            <guid>https://www.tenable.com/plugins/nnm/701419</guid>
            <pubDate>Tue, 30 Aug 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701419 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 105.0.5195.52. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_08_stable-channel-update-for-desktop_30 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 105.0.5195.52 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701419">https://www.tenable.com/plugins/nnm/701419</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15.6.1 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701418</link>
            <guid>https://www.tenable.com/plugins/nnm/701418</guid>
            <pubDate>Thu, 18 Aug 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701418 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15.6.1. It is, therefore, affected by a vulnerability as referenced in the HT213414 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15.6.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701418">https://www.tenable.com/plugins/nnm/701418</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 104.0.5112.101 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701417</link>
            <guid>https://www.tenable.com/plugins/nnm/701417</guid>
            <pubDate>Tue, 16 Aug 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701417 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 104.0.5112.101. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_08_stable-channel-update-for-desktop_16 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 104.0.5112.101 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701417">https://www.tenable.com/plugins/nnm/701417</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 104.0.5112.79 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701416</link>
            <guid>https://www.tenable.com/plugins/nnm/701416</guid>
            <pubDate>Tue, 02 Aug 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701416 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 104.0.5112.79. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_08_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 104.0.5112.79 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701416">https://www.tenable.com/plugins/nnm/701416</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701415</link>
            <guid>https://www.tenable.com/plugins/nnm/701415</guid>
            <pubDate>Wed, 20 Jul 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701415 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15.6. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213341 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701415">https://www.tenable.com/plugins/nnm/701415</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 103.0.5060.134 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701414</link>
            <guid>https://www.tenable.com/plugins/nnm/701414</guid>
            <pubDate>Tue, 19 Jul 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701414 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 103.0.5060.134. It is, therefore, affected by a vulnerability as referenced in the 2022_07_stable-channel-update-for-desktop_19 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 103.0.5060.134 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701414">https://www.tenable.com/plugins/nnm/701414</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.65 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701413</link>
            <guid>https://www.tenable.com/plugins/nnm/701413</guid>
            <pubDate>Thu, 23 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701413 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.65. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.65_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.65 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701413">https://www.tenable.com/plugins/nnm/701413</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.82 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701412</link>
            <guid>https://www.tenable.com/plugins/nnm/701412</guid>
            <pubDate>Thu, 23 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701412 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.82. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.82_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.82 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701412">https://www.tenable.com/plugins/nnm/701412</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.0-M17 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701411</link>
            <guid>https://www.tenable.com/plugins/nnm/701411</guid>
            <pubDate>Thu, 23 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701411 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.0-M17. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.0-m17_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.0-M17 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701411">https://www.tenable.com/plugins/nnm/701411</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.23 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701410</link>
            <guid>https://www.tenable.com/plugins/nnm/701410</guid>
            <pubDate>Thu, 23 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701410 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.23. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.23_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.23 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701410">https://www.tenable.com/plugins/nnm/701410</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 103.0.5060.53 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701409</link>
            <guid>https://www.tenable.com/plugins/nnm/701409</guid>
            <pubDate>Tue, 21 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701409 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 103.0.5060.53. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_06_stable-channel-update-for-desktop_21 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 103.0.5060.53 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701409">https://www.tenable.com/plugins/nnm/701409</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 102.0.5005.115 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701408</link>
            <guid>https://www.tenable.com/plugins/nnm/701408</guid>
            <pubDate>Thu, 09 Jun 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701408 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 102.0.5005.115. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_06_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 102.0.5005.115 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701408">https://www.tenable.com/plugins/nnm/701408</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701407</link>
            <guid>https://www.tenable.com/plugins/nnm/701407</guid>
            <pubDate>Tue, 17 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701407 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15.5. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213260 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701407">https://www.tenable.com/plugins/nnm/701407</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 101.0.4951.64 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701406</link>
            <guid>https://www.tenable.com/plugins/nnm/701406</guid>
            <pubDate>Tue, 10 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701406 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 101.0.4951.64. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_05_stable-channel-update-for-desktop_10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 101.0.4951.64 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701406">https://www.tenable.com/plugins/nnm/701406</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.63 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701405</link>
            <guid>https://www.tenable.com/plugins/nnm/701405</guid>
            <pubDate>Tue, 10 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701405 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.63. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.63_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.63 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701405">https://www.tenable.com/plugins/nnm/701405</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.79 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701404</link>
            <guid>https://www.tenable.com/plugins/nnm/701404</guid>
            <pubDate>Tue, 10 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701404 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.79. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.79_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.79 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701404">https://www.tenable.com/plugins/nnm/701404</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.0-M15 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701403</link>
            <guid>https://www.tenable.com/plugins/nnm/701403</guid>
            <pubDate>Tue, 10 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701403 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.0-M15. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.0-m15_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.0-M15 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701403">https://www.tenable.com/plugins/nnm/701403</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.21 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701402</link>
            <guid>https://www.tenable.com/plugins/nnm/701402</guid>
            <pubDate>Tue, 10 May 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701402 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.21. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.21_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.21 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701402">https://www.tenable.com/plugins/nnm/701402</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 101.0.4951.41 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701401</link>
            <guid>https://www.tenable.com/plugins/nnm/701401</guid>
            <pubDate>Tue, 26 Apr 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701401 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 101.0.4951.41. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_04_stable-channel-update-for-desktop_26 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 101.0.4951.41 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701401">https://www.tenable.com/plugins/nnm/701401</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 100.0.4896.127 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701400</link>
            <guid>https://www.tenable.com/plugins/nnm/701400</guid>
            <pubDate>Thu, 14 Apr 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701400 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 100.0.4896.127. It is, therefore, affected by a vulnerability as referenced in the 2022_04_stable-channel-update-for-desktop_14 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 100.0.4896.127 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701400">https://www.tenable.com/plugins/nnm/701400</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 100.0.4896.88 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701399</link>
            <guid>https://www.tenable.com/plugins/nnm/701399</guid>
            <pubDate>Mon, 11 Apr 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701399 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 100.0.4896.88. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_04_stable-channel-update-for-desktop_11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 100.0.4896.88 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701399">https://www.tenable.com/plugins/nnm/701399</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 100.0.4896.75 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701398</link>
            <guid>https://www.tenable.com/plugins/nnm/701398</guid>
            <pubDate>Mon, 04 Apr 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701398 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 100.0.4896.75. It is, therefore, affected by a vulnerability as referenced in the 2022_04_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 100.0.4896.75 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701398">https://www.tenable.com/plugins/nnm/701398</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 100.0.4896.60 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701397</link>
            <guid>https://www.tenable.com/plugins/nnm/701397</guid>
            <pubDate>Tue, 29 Mar 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701397 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 100.0.4896.60. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_03_stable-channel-update-for-desktop_29 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 100.0.4896.60 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701397">https://www.tenable.com/plugins/nnm/701397</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 99.0.4844.84 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701396</link>
            <guid>https://www.tenable.com/plugins/nnm/701396</guid>
            <pubDate>Fri, 25 Mar 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701396 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 99.0.4844.84. It is, therefore, affected by a vulnerability as referenced in the 2022_03_stable-channel-update-for-desktop_25 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 99.0.4844.84 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701396">https://www.tenable.com/plugins/nnm/701396</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701395</link>
            <guid>https://www.tenable.com/plugins/nnm/701395</guid>
            <pubDate>Wed, 16 Mar 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701395 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15.4. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213187 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701395">https://www.tenable.com/plugins/nnm/701395</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 99.0.4844.74 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701394</link>
            <guid>https://www.tenable.com/plugins/nnm/701394</guid>
            <pubDate>Tue, 15 Mar 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701394 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 99.0.4844.74. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_03_stable-channel-update-for-desktop_15 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 99.0.4844.74 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701394">https://www.tenable.com/plugins/nnm/701394</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 99.0.4844.51 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701393</link>
            <guid>https://www.tenable.com/plugins/nnm/701393</guid>
            <pubDate>Tue, 01 Mar 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701393 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 99.0.4844.51. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_03_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 99.0.4844.51 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701393">https://www.tenable.com/plugins/nnm/701393</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 98.0.4758.102 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701392</link>
            <guid>https://www.tenable.com/plugins/nnm/701392</guid>
            <pubDate>Mon, 14 Feb 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701392 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 98.0.4758.102. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_02_stable-channel-update-for-desktop_14 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 98.0.4758.102 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701392">https://www.tenable.com/plugins/nnm/701392</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15.3 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701391</link>
            <guid>https://www.tenable.com/plugins/nnm/701391</guid>
            <pubDate>Fri, 11 Feb 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701391 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15.3. It is, therefore, affected by a vulnerability as referenced in the HT213091 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701391">https://www.tenable.com/plugins/nnm/701391</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 98.0.4758.80 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701390</link>
            <guid>https://www.tenable.com/plugins/nnm/701390</guid>
            <pubDate>Tue, 01 Feb 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701390 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 98.0.4758.80. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_02_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 98.0.4758.80 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701390">https://www.tenable.com/plugins/nnm/701390</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701389</link>
            <guid>https://www.tenable.com/plugins/nnm/701389</guid>
            <pubDate>Wed, 26 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701389 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15.3. It is, therefore, affected by multiple vulnerabilities as referenced in the HT213058 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701389">https://www.tenable.com/plugins/nnm/701389</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.75 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701388</link>
            <guid>https://www.tenable.com/plugins/nnm/701388</guid>
            <pubDate>Wed, 26 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701388 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.75. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_8.5.75_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.75 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701388">https://www.tenable.com/plugins/nnm/701388</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.0-M10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701387</link>
            <guid>https://www.tenable.com/plugins/nnm/701387</guid>
            <pubDate>Wed, 26 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701387 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.0-M10. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.1.0-m10_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.0-M10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701387">https://www.tenable.com/plugins/nnm/701387</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701386</link>
            <guid>https://www.tenable.com/plugins/nnm/701386</guid>
            <pubDate>Wed, 26 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701386 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.16. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.0.16_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701386">https://www.tenable.com/plugins/nnm/701386</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.58 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701385</link>
            <guid>https://www.tenable.com/plugins/nnm/701385</guid>
            <pubDate>Wed, 26 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701385 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.58. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_9.0.58_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.58 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701385">https://www.tenable.com/plugins/nnm/701385</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 97.0.4692.99 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701384</link>
            <guid>https://www.tenable.com/plugins/nnm/701384</guid>
            <pubDate>Wed, 19 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701384 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 97.0.4692.99. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_01_stable-channel-update-for-desktop_19 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 97.0.4692.99 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701384">https://www.tenable.com/plugins/nnm/701384</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 97.0.4692.71 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701383</link>
            <guid>https://www.tenable.com/plugins/nnm/701383</guid>
            <pubDate>Tue, 04 Jan 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701383 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 97.0.4692.71. It is, therefore, affected by multiple vulnerabilities as referenced in the 2022_01_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 97.0.4692.71 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701383">https://www.tenable.com/plugins/nnm/701383</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701382</link>
            <guid>https://www.tenable.com/plugins/nnm/701382</guid>
            <pubDate>Wed, 15 Dec 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701382 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15.2. It is, therefore, affected by multiple vulnerabilities as referenced in the HT212982 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701382">https://www.tenable.com/plugins/nnm/701382</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 96.0.4664.93 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701381</link>
            <guid>https://www.tenable.com/plugins/nnm/701381</guid>
            <pubDate>Tue, 14 Dec 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701381 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 96.0.4664.93. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_12_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 96.0.4664.93 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701381">https://www.tenable.com/plugins/nnm/701381</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 96.0.4664.110 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701380</link>
            <guid>https://www.tenable.com/plugins/nnm/701380</guid>
            <pubDate>Mon, 13 Dec 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701380 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 96.0.4664.110. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_12_stable-channel-update-for-desktop_13 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 96.0.4664.110 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701380">https://www.tenable.com/plugins/nnm/701380</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 96.0.4664.93 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701379</link>
            <guid>https://www.tenable.com/plugins/nnm/701379</guid>
            <pubDate>Mon, 06 Dec 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701379 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 96.0.4664.93. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_12_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 96.0.4664.93 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701379">https://www.tenable.com/plugins/nnm/701379</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 96.0.4664.45 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701378</link>
            <guid>https://www.tenable.com/plugins/nnm/701378</guid>
            <pubDate>Mon, 15 Nov 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701378 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 96.0.4664.45. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_11_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 96.0.4664.45 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701378">https://www.tenable.com/plugins/nnm/701378</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 95.0.4638.69 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701377</link>
            <guid>https://www.tenable.com/plugins/nnm/701377</guid>
            <pubDate>Thu, 28 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701377 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 95.0.4638.69. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_10_stable-channel-update-for-desktop_28 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 95.0.4638.69 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701377">https://www.tenable.com/plugins/nnm/701377</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701376</link>
            <guid>https://www.tenable.com/plugins/nnm/701376</guid>
            <pubDate>Thu, 28 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701376 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT212875 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701376">https://www.tenable.com/plugins/nnm/701376</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 95.0.4638.54 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701375</link>
            <guid>https://www.tenable.com/plugins/nnm/701375</guid>
            <pubDate>Tue, 19 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701375 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 95.0.4638.54. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_10_stable-channel-update-for-desktop_19 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 95.0.4638.54 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701375">https://www.tenable.com/plugins/nnm/701375</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.1.0-M6 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701374</link>
            <guid>https://www.tenable.com/plugins/nnm/701374</guid>
            <pubDate>Thu, 14 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701374 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.1.0-M6. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.0-m6_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.0-M6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701374">https://www.tenable.com/plugins/nnm/701374</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.54 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701373</link>
            <guid>https://www.tenable.com/plugins/nnm/701373</guid>
            <pubDate>Thu, 14 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701373 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.54. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.54_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.54 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701373">https://www.tenable.com/plugins/nnm/701373</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.12 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701372</link>
            <guid>https://www.tenable.com/plugins/nnm/701372</guid>
            <pubDate>Thu, 14 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701372 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.12. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.12_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.12 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701372">https://www.tenable.com/plugins/nnm/701372</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.72 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701371</link>
            <guid>https://www.tenable.com/plugins/nnm/701371</guid>
            <pubDate>Thu, 14 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701371 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.72. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.72_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.72 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701371">https://www.tenable.com/plugins/nnm/701371</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 94.0.4606.81 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701370</link>
            <guid>https://www.tenable.com/plugins/nnm/701370</guid>
            <pubDate>Thu, 07 Oct 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701370 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 94.0.4606.81. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_10_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 94.0.4606.81 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701370">https://www.tenable.com/plugins/nnm/701370</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 94.0.4606.71 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701369</link>
            <guid>https://www.tenable.com/plugins/nnm/701369</guid>
            <pubDate>Thu, 30 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701369 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 94.0.4606.71. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_09_stable-channel-update-for-desktop_30 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 94.0.4606.71 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701369">https://www.tenable.com/plugins/nnm/701369</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 94.0.4606.54 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701368</link>
            <guid>https://www.tenable.com/plugins/nnm/701368</guid>
            <pubDate>Tue, 21 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701368 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 94.0.4606.54. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_09_stable-channel-update-for-desktop_21 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 94.0.4606.54 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701368">https://www.tenable.com/plugins/nnm/701368</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 15 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701367</link>
            <guid>https://www.tenable.com/plugins/nnm/701367</guid>
            <pubDate>Mon, 20 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701367 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 15. It is, therefore, affected by multiple vulnerabilities as referenced in the HT212816 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 15 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701367">https://www.tenable.com/plugins/nnm/701367</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.64 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701366</link>
            <guid>https://www.tenable.com/plugins/nnm/701366</guid>
            <pubDate>Wed, 15 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701366 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.64. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.64_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.64 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701366">https://www.tenable.com/plugins/nnm/701366</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.44 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701365</link>
            <guid>https://www.tenable.com/plugins/nnm/701365</guid>
            <pubDate>Wed, 15 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701365 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.44. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.44_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.44 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701365">https://www.tenable.com/plugins/nnm/701365</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.4 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701364</link>
            <guid>https://www.tenable.com/plugins/nnm/701364</guid>
            <pubDate>Wed, 15 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701364 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.4. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.4_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701364">https://www.tenable.com/plugins/nnm/701364</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 14.1.2 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701363</link>
            <guid>https://www.tenable.com/plugins/nnm/701363</guid>
            <pubDate>Mon, 13 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701363 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 14.1.2. It is, therefore, affected by a vulnerability as referenced in the HT212808 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 14.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701363">https://www.tenable.com/plugins/nnm/701363</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 93.0.4577.82 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701362</link>
            <guid>https://www.tenable.com/plugins/nnm/701362</guid>
            <pubDate>Mon, 13 Sep 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701362 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 93.0.4577.82. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_09_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 93.0.4577.82 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701362">https://www.tenable.com/plugins/nnm/701362</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 93.0.4577.63 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701361</link>
            <guid>https://www.tenable.com/plugins/nnm/701361</guid>
            <pubDate>Tue, 31 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701361 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 93.0.4577.63. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_08_stable-channel-update-for-desktop_31 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 93.0.4577.63 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701361">https://www.tenable.com/plugins/nnm/701361</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 92.0.4515.159 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701360</link>
            <guid>https://www.tenable.com/plugins/nnm/701360</guid>
            <pubDate>Tue, 17 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701360 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 92.0.4515.159. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_08_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 92.0.4515.159 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701360">https://www.tenable.com/plugins/nnm/701360</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 92.0.4515.131 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701359</link>
            <guid>https://www.tenable.com/plugins/nnm/701359</guid>
            <pubDate>Tue, 03 Aug 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701359 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 92.0.4515.131. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_08_the-stable-channel-has-been-updated-to advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 92.0.4515.131 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701359">https://www.tenable.com/plugins/nnm/701359</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 14.1.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701358</link>
            <guid>https://www.tenable.com/plugins/nnm/701358</guid>
            <pubDate>Wed, 21 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701358 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 14.1.2. It is, therefore, affected by multiple vulnerabilities as referenced in the HT212606 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 14.1.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701358">https://www.tenable.com/plugins/nnm/701358</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.46 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701357</link>
            <guid>https://www.tenable.com/plugins/nnm/701357</guid>
            <pubDate>Mon, 12 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701357 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.46. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.46_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.46 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701357">https://www.tenable.com/plugins/nnm/701357</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.7 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701356</link>
            <guid>https://www.tenable.com/plugins/nnm/701356</guid>
            <pubDate>Mon, 12 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701356 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.7. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.7_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701356">https://www.tenable.com/plugins/nnm/701356</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.68 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701355</link>
            <guid>https://www.tenable.com/plugins/nnm/701355</guid>
            <pubDate>Mon, 12 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701355 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.68. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.68_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.68 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701355">https://www.tenable.com/plugins/nnm/701355</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 9.0.48 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701354</link>
            <guid>https://www.tenable.com/plugins/nnm/701354</guid>
            <pubDate>Mon, 12 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701354 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 9.0.48. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.48_security-9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.48 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701354">https://www.tenable.com/plugins/nnm/701354</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 8.5.66 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701353</link>
            <guid>https://www.tenable.com/plugins/nnm/701353</guid>
            <pubDate>Mon, 12 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701353 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 8.5.66. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.66_security-8 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 8.5.66 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701353">https://www.tenable.com/plugins/nnm/701353</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.6 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701352</link>
            <guid>https://www.tenable.com/plugins/nnm/701352</guid>
            <pubDate>Mon, 12 Jul 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701352 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.6. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.6_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701352">https://www.tenable.com/plugins/nnm/701352</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.0-M5 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701351</link>
            <guid>https://www.tenable.com/plugins/nnm/701351</guid>
            <pubDate>Thu, 17 Jun 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701351 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.0-M5. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.0-m5_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.0-M5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701351">https://www.tenable.com/plugins/nnm/701351</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701350</link>
            <guid>https://www.tenable.com/plugins/nnm/701350</guid>
            <pubDate>Thu, 17 Jun 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701350 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.2. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.0.2_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701350">https://www.tenable.com/plugins/nnm/701350</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 91.0.4472.114 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701349</link>
            <guid>https://www.tenable.com/plugins/nnm/701349</guid>
            <pubDate>Thu, 17 Jun 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701349 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 91.0.4472.114. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_06_stable-channel-update-for-desktop_17 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 91.0.4472.114 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701349">https://www.tenable.com/plugins/nnm/701349</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 91.0.4472.101 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701348</link>
            <guid>https://www.tenable.com/plugins/nnm/701348</guid>
            <pubDate>Wed, 09 Jun 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701348 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 91.0.4472.101. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_06_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 91.0.4472.101 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701348">https://www.tenable.com/plugins/nnm/701348</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 91.0.4472.77 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701347</link>
            <guid>https://www.tenable.com/plugins/nnm/701347</guid>
            <pubDate>Tue, 25 May 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701347 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 91.0.4472.77. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_05_stable-channel-update-for-desktop_25 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 91.0.4472.77 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701347">https://www.tenable.com/plugins/nnm/701347</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 14.1.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701346</link>
            <guid>https://www.tenable.com/plugins/nnm/701346</guid>
            <pubDate>Tue, 25 May 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701346 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 14.1.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT212534 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 14.1.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701346">https://www.tenable.com/plugins/nnm/701346</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 90.0.4430.212 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701345</link>
            <guid>https://www.tenable.com/plugins/nnm/701345</guid>
            <pubDate>Mon, 10 May 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701345 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 90.0.4430.212. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_05_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 90.0.4430.212 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701345">https://www.tenable.com/plugins/nnm/701345</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 14.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701344</link>
            <guid>https://www.tenable.com/plugins/nnm/701344</guid>
            <pubDate>Wed, 05 May 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701344 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 14.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT212340 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 14.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701344">https://www.tenable.com/plugins/nnm/701344</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 90.0.4430.93 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701341</link>
            <guid>https://www.tenable.com/plugins/nnm/701341</guid>
            <pubDate>Mon, 26 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701341 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 90.0.4430.93. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_04_stable-channel-update-for-desktop_26 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 90.0.4430.93 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701341">https://www.tenable.com/plugins/nnm/701341</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 14.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701340</link>
            <guid>https://www.tenable.com/plugins/nnm/701340</guid>
            <pubDate>Mon, 26 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701340 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 14.1. It is, therefore, affected by multiple vulnerabilities as referenced in the HT212318 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 14.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701340">https://www.tenable.com/plugins/nnm/701340</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 90.0.4430.85 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701339</link>
            <guid>https://www.tenable.com/plugins/nnm/701339</guid>
            <pubDate>Tue, 20 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701339 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 90.0.4430.85. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_04_stable-channel-update-for-desktop_20 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 90.0.4430.85 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701339">https://www.tenable.com/plugins/nnm/701339</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 7.0.84 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701338</link>
            <guid>https://www.tenable.com/plugins/nnm/701338</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701338 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 7.0.84. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_7.0.84_security-7 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 7.0.84 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701338">https://www.tenable.com/plugins/nnm/701338</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 7.0.88 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701337</link>
            <guid>https://www.tenable.com/plugins/nnm/701337</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701337 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 7.0.88. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_7.0.88_security-7 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 7.0.88 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701337">https://www.tenable.com/plugins/nnm/701337</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 7.0.67 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701336</link>
            <guid>https://www.tenable.com/plugins/nnm/701336</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701336 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 7.0.67. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_7.0.67_security-7 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 7.0.67 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701336">https://www.tenable.com/plugins/nnm/701336</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 7.0.65 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701335</link>
            <guid>https://www.tenable.com/plugins/nnm/701335</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701335 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 7.0.65. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_7.0.65_security-7 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 7.0.65 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701335">https://www.tenable.com/plugins/nnm/701335</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 7.0.91 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701334</link>
            <guid>https://www.tenable.com/plugins/nnm/701334</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701334 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 7.0.91. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_7.0.91_security-7 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 7.0.91 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701334">https://www.tenable.com/plugins/nnm/701334</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 7.0.78 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701333</link>
            <guid>https://www.tenable.com/plugins/nnm/701333</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701333 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 7.0.78. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_7.0.78_security-7 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 7.0.78 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701333">https://www.tenable.com/plugins/nnm/701333</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.0-M8 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701332</link>
            <guid>https://www.tenable.com/plugins/nnm/701332</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701332 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.0-M8. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.0-m8_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.0-M8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701332">https://www.tenable.com/plugins/nnm/701332</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.0-M6 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701331</link>
            <guid>https://www.tenable.com/plugins/nnm/701331</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701331 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.0-M6. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.0.0-m6_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.0-M6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701331">https://www.tenable.com/plugins/nnm/701331</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.0-M10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701330</link>
            <guid>https://www.tenable.com/plugins/nnm/701330</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701330 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.0-M10. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.0.0-m10_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.0-M10 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701330">https://www.tenable.com/plugins/nnm/701330</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat < 10.0.0-M7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701329</link>
            <guid>https://www.tenable.com/plugins/nnm/701329</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701329 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by Multiple Vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Apache Tomcat installed on the remote host is < 10.0.0-M7. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.0.0-m7_security-10 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.0.0-M7 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701329">https://www.tenable.com/plugins/nnm/701329</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 90.0.4430.72 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701328</link>
            <guid>https://www.tenable.com/plugins/nnm/701328</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701328 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 90.0.4430.72. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_04_stable-channel-update-for-desktop_14 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 90.0.4430.72 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701328">https://www.tenable.com/plugins/nnm/701328</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 88.0.4324.146 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701327</link>
            <guid>https://www.tenable.com/plugins/nnm/701327</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701327 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 88.0.4324.146. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_02_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 88.0.4324.146 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701327">https://www.tenable.com/plugins/nnm/701327</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 89.0.4389.114 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701326</link>
            <guid>https://www.tenable.com/plugins/nnm/701326</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701326 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 89.0.4389.114. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_03_stable-channel-update-for-desktop_30 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 89.0.4389.114 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701326">https://www.tenable.com/plugins/nnm/701326</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 88.0.4324.182 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701325</link>
            <guid>https://www.tenable.com/plugins/nnm/701325</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701325 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 88.0.4324.182. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_02_stable-channel-update-for-desktop_16 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 88.0.4324.182 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701325">https://www.tenable.com/plugins/nnm/701325</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 89.0.4389.72 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701324</link>
            <guid>https://www.tenable.com/plugins/nnm/701324</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701324 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 89.0.4389.72. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_03_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 89.0.4389.72 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701324">https://www.tenable.com/plugins/nnm/701324</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 88.0.4324.150 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701323</link>
            <guid>https://www.tenable.com/plugins/nnm/701323</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701323 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 88.0.4324.150. It is, therefore, affected by a vulnerability as referenced in the 2021_02_stable-channel-update-for-desktop_4 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 88.0.4324.150 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701323">https://www.tenable.com/plugins/nnm/701323</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 89.0.4389.90 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701322</link>
            <guid>https://www.tenable.com/plugins/nnm/701322</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701322 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 89.0.4389.90. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_03_stable-channel-update-for-desktop_12 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 89.0.4389.90 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701322">https://www.tenable.com/plugins/nnm/701322</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 89.0.4389.128 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701321</link>
            <guid>https://www.tenable.com/plugins/nnm/701321</guid>
            <pubDate>Wed, 14 Apr 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701321 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 89.0.4389.128. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_04_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 89.0.4389.128 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701321">https://www.tenable.com/plugins/nnm/701321</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 88.0.4324.146 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701298</link>
            <guid>https://www.tenable.com/plugins/nnm/701298</guid>
            <pubDate>Tue, 02 Feb 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701298 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 88.0.4324.146. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_02_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 88.0.4324.146 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701298">https://www.tenable.com/plugins/nnm/701298</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 88.0.4324.96 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701297</link>
            <guid>https://www.tenable.com/plugins/nnm/701297</guid>
            <pubDate>Tue, 19 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701297 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 88.0.4324.96. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_01_stable-channel-update-for-desktop_19 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 88.0.4324.96 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701297">https://www.tenable.com/plugins/nnm/701297</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 87.0.4280.141 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701296</link>
            <guid>https://www.tenable.com/plugins/nnm/701296</guid>
            <pubDate>Wed, 06 Jan 2021 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701296 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 87.0.4280.141. It is, therefore, affected by multiple vulnerabilities as referenced in the 2021_01_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 87.0.4280.141 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701296">https://www.tenable.com/plugins/nnm/701296</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari < 14.0.2 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701295</link>
            <guid>https://www.tenable.com/plugins/nnm/701295</guid>
            <pubDate>Tue, 15 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701295 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Safari installed on the remote host is prior to 14.0.2. It is, therefore, affected by a vulnerability as referenced in the HT212007 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Safari version 14.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701295">https://www.tenable.com/plugins/nnm/701295</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 87.0.4280.88 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701294</link>
            <guid>https://www.tenable.com/plugins/nnm/701294</guid>
            <pubDate>Fri, 04 Dec 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701294 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 87.0.4280.88. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_12_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 87.0.4280.88 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701294">https://www.tenable.com/plugins/nnm/701294</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 87.0.4280.66 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701293</link>
            <guid>https://www.tenable.com/plugins/nnm/701293</guid>
            <pubDate>Tue, 17 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701293 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 87.0.4280.66. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_11_stable-channel-update-for-desktop_17 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 87.0.4280.66 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701293">https://www.tenable.com/plugins/nnm/701293</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 86.0.4240.198 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701292</link>
            <guid>https://www.tenable.com/plugins/nnm/701292</guid>
            <pubDate>Wed, 11 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701292 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 86.0.4240.198. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_11_stable-channel-update-for-desktop_11 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 86.0.4240.198 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701292">https://www.tenable.com/plugins/nnm/701292</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 86.0.4240.193 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701291</link>
            <guid>https://www.tenable.com/plugins/nnm/701291</guid>
            <pubDate>Mon, 09 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701291 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 86.0.4240.193. It is, therefore, affected by a vulnerability as referenced in the 2020_11_stable-channel-update-for-desktop_9 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 86.0.4240.193 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701291">https://www.tenable.com/plugins/nnm/701291</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 86.0.4240.183 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701290</link>
            <guid>https://www.tenable.com/plugins/nnm/701290</guid>
            <pubDate>Mon, 02 Nov 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701290 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 86.0.4240.183. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_11_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 86.0.4240.183 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701290">https://www.tenable.com/plugins/nnm/701290</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 86.0.4240.111 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701289</link>
            <guid>https://www.tenable.com/plugins/nnm/701289</guid>
            <pubDate>Tue, 20 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701289 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 86.0.4240.111. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_10_stable-channel-update-for-desktop_20 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 86.0.4240.111 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701289">https://www.tenable.com/plugins/nnm/701289</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 86.0.4240.75 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701288</link>
            <guid>https://www.tenable.com/plugins/nnm/701288</guid>
            <pubDate>Tue, 06 Oct 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701288 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 86.0.4240.75. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_10_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 86.0.4240.75 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701288">https://www.tenable.com/plugins/nnm/701288</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 85.0.4183.121 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701287</link>
            <guid>https://www.tenable.com/plugins/nnm/701287</guid>
            <pubDate>Mon, 21 Sep 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701287 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 85.0.4183.121. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_09_stable-channel-update-for-desktop_21 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 85.0.4183.121 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701287">https://www.tenable.com/plugins/nnm/701287</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 85.0.4183.102 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701286</link>
            <guid>https://www.tenable.com/plugins/nnm/701286</guid>
            <pubDate>Tue, 08 Sep 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701286 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 85.0.4183.102. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_09_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 85.0.4183.102 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701286">https://www.tenable.com/plugins/nnm/701286</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 85.0.4183.83 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701285</link>
            <guid>https://www.tenable.com/plugins/nnm/701285</guid>
            <pubDate>Tue, 25 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701285 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 85.0.4183.83. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_08_stable-channel-update-for-desktop_25 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 85.0.4183.83 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701285">https://www.tenable.com/plugins/nnm/701285</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 84.0.4147.135 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701284</link>
            <guid>https://www.tenable.com/plugins/nnm/701284</guid>
            <pubDate>Tue, 18 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701284 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 84.0.4147.135. It is, therefore, affected by a vulnerability as referenced in the 2020_08_stable-channel-update-for-desktop_18 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 84.0.4147.135 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701284">https://www.tenable.com/plugins/nnm/701284</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 84.0.4147.125 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701283</link>
            <guid>https://www.tenable.com/plugins/nnm/701283</guid>
            <pubDate>Mon, 10 Aug 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701283 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 84.0.4147.125. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_08_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 84.0.4147.125 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701283">https://www.tenable.com/plugins/nnm/701283</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 84.0.4147.105 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701282</link>
            <guid>https://www.tenable.com/plugins/nnm/701282</guid>
            <pubDate>Mon, 27 Jul 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701282 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 84.0.4147.105. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_07_stable-channel-update-for-desktop_27 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 84.0.4147.105 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701282">https://www.tenable.com/plugins/nnm/701282</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 84.0.4147.89 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701281</link>
            <guid>https://www.tenable.com/plugins/nnm/701281</guid>
            <pubDate>Tue, 14 Jul 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701281 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 84.0.4147.89. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_07_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 84.0.4147.89 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701281">https://www.tenable.com/plugins/nnm/701281</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 83.0.4103.106 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701280</link>
            <guid>https://www.tenable.com/plugins/nnm/701280</guid>
            <pubDate>Fri, 26 Jun 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701280 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 83.0.4103.106. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_06_stable-channel-update-for-desktop_15 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 83.0.4103.106 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701280">https://www.tenable.com/plugins/nnm/701280</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 83.0.4103.116 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701279</link>
            <guid>https://www.tenable.com/plugins/nnm/701279</guid>
            <pubDate>Tue, 23 Jun 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701279 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 83.0.4103.116. It is, therefore, affected by a vulnerability as referenced in the 2020_06_stable-channel-update-for-desktop_22 advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 83.0.4103.116 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701279">https://www.tenable.com/plugins/nnm/701279</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 83.0.4103.97 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701278</link>
            <guid>https://www.tenable.com/plugins/nnm/701278</guid>
            <pubDate>Fri, 12 Jun 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701278 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote host is prior to 83.0.4103.97. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_06_stable-channel-update-for-desktop advisory. Note that Nessus Network Monitor has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 83.0.4103.97 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701278">https://www.tenable.com/plugins/nnm/701278</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rockwell Automation Stratix 5950 Industrial EtherNet/IP Security Appliance <= 16.4 Directory Traversal Attack]]></title>
            <link>https://www.tenable.com/plugins/nnm/720319</link>
            <guid>https://www.tenable.com/plugins/nnm/720319</guid>
            <pubDate>Fri, 22 May 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720319 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Rockwell Automation/Allen-Bradley Stratix 5950 Industrial EtherNet/IP Security Appliance &lt;= 16.4 may be be exploitable remotely by targeting Cisco Adaptive Security Appliance vulnerability.<br /></span>
      <h3>Description</h3>
      <span>A vulnerability in the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to conduct directory traversal attack and obtain read and delete access to sensitive files on a targeted system.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720319">https://www.tenable.com/plugins/nnm/720319</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, and 12.2.1.4.0 T3 Access Attack]]></title>
            <link>https://www.tenable.com/plugins/nnm/701276</link>
            <guid>https://www.tenable.com/plugins/nnm/701276</guid>
            <pubDate>Mon, 18 May 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701276 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>An Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, and 12.2.1.4.0 is affected by a vulnerability that may result in takeover of the Server.<br /></span>
      <h3>Description</h3>
      <span>Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Oracle WebLogic Server version 12.2.1.4.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701276">https://www.tenable.com/plugins/nnm/701276</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox < 74.0.1 Race Condition]]></title>
            <link>https://www.tenable.com/plugins/nnm/701275</link>
            <guid>https://www.tenable.com/plugins/nnm/701275</guid>
            <pubDate>Fri, 24 Apr 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701275 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a race condition vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Firefox installed on the remote host is prior to 74.0.1. It is affected by a race condition when handling a ReadableStream or running the nsDocShell destructor that can cause a use-after-free. There are known targeted attacks in the wild abusing this flaw. <br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Mozilla Firefox version 74.0.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701275">https://www.tenable.com/plugins/nnm/701275</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 68.6.1 Race Condition]]></title>
            <link>https://www.tenable.com/plugins/nnm/701273</link>
            <guid>https://www.tenable.com/plugins/nnm/701273</guid>
            <pubDate>Fri, 24 Apr 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701273 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a race condition vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Firefox ESR installed on the remote host is prior to 68.6.1. It is affected by a race condition when handling a ReadableStream or running the nsDocShell destructor that can cause a use-after-free. There are known targeted attacks in the wild abusing this flaw. <br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Mozilla Firefox ESR version 68.6.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701273">https://www.tenable.com/plugins/nnm/701273</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Trend Micro Apex One and OfficeScan XG Arbitrary Code Execution]]></title>
            <link>https://www.tenable.com/plugins/nnm/701274</link>
            <guid>https://www.tenable.com/plugins/nnm/701274</guid>
            <pubDate>Tue, 17 Mar 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701274 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host contains an application that is affected by an arbitrary code execution vulnerability.<br /></span>
      <h3>Description</h3>
      <span>Trend Micro OfficeScan is installed on the remote host and is affected by an arbitrary code execution vulnerability. An attempted attack requires user authentication.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701274">https://www.tenable.com/plugins/nnm/701274</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Exchange Remote Code Execution Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701277</link>
            <guid>https://www.tenable.com/plugins/nnm/701277</guid>
            <pubDate>Fri, 06 Mar 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701277 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is vulnerable to a Remote Code Execution Vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft Exchange Server installed on the remote host is missing security updates. A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. An attacker could then install programs; view, change, or delete data; or create new accounts.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade or patch according to vendor recommendations.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701277">https://www.tenable.com/plugins/nnm/701277</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 80.0.3987.122 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701270</link>
            <guid>https://www.tenable.com/plugins/nnm/701270</guid>
            <pubDate>Wed, 26 Feb 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701270 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by multiple Use-After-Free (UAF) vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed is prior to 80.0.3987.122. It is, therefore, affected by multiple vulnerabilities as referenced in the 2020_02_stable-channel-update-for-desktop_24 advisory.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Chrome version 80.0.3987.122 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701270">https://www.tenable.com/plugins/nnm/701270</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 7.0.x < 7.0.100 / 8.5.x < 8.5.51 / 9.0.x < 9.0.31 Arbitrary File Read Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nnm/701269</link>
            <guid>https://www.tenable.com/plugins/nnm/701269</guid>
            <pubDate>Tue, 25 Feb 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701269 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Apache Tomcat server is affected by an arbitrary file read vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The Apache Tomcat installed on the remote host version 7.0.x prior to 7.0.100, 8.5.x prior to 8.5.51, or 9.0.x prior to 9.0.31 is affected by an arbitrary file read vulnerability in its AJP protocol due to an implementation defect. A remote, unauthenticated attacker could exploit this to access files which, under normal conditions, would be restricted. If the Tomcat instance supports file uploads, the vulnerability could also be leveraged to achieve remote code execution.<br /></span>
      <h3>Solution</h3>
      <span>Update to Apache Tomcat version 9.0.31 or later. If version 9.x cannot be obtained, versions 8.5.51 and 7.0.100 have also been patched for these vulnerabilities.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701269">https://www.tenable.com/plugins/nnm/701269</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco IOS XR Software Cisco Discovery Protocol DoS (cisco-sa-20200205-fxnxos-iosxr-cdp-dos)]]></title>
            <link>https://www.tenable.com/plugins/nnm/701266</link>
            <guid>https://www.tenable.com/plugins/nnm/701266</guid>
            <pubDate>Tue, 18 Feb 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701266 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is missing a vendor-supplied security patch.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Cisco IOS XR Software is affected by a denial of service vulnerability within the Cisco Discovery Protocol due to missing a check when processing protocol messages. An unauthenticated, adjacent attacker can exploit this to cause the device to reboot.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvr15024.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701266">https://www.tenable.com/plugins/nnm/701266</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco IOS XR Software Cisco Discovery Protocol RCE (cisco-sa-20200205-iosxr-cdp-rce)]]></title>
            <link>https://www.tenable.com/plugins/nnm/701265</link>
            <guid>https://www.tenable.com/plugins/nnm/701265</guid>
            <pubDate>Tue, 18 Feb 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701265 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is missing a vendor-supplied security patch.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the Cisco IOS XR Software is affected by a remote code execution vulnerability within the Cisco Discovery Protocol due to improper validation of string input. An unauthenticated, adjacent attacker can exploit this to bypass authentication and execute arbitrary commands with root privileges.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvr09190.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701265">https://www.tenable.com/plugins/nnm/701265</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Servelec Technologies TBox Remote Terminal Unit]]></title>
            <link>https://www.tenable.com/plugins/nnm/701264</link>
            <guid>https://www.tenable.com/plugins/nnm/701264</guid>
            <pubDate>Thu, 23 Jan 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701264 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Servelec Technologies TBox Remote Terminal Unit has been detected.<br /></span>
      <h3>Description</h3>
      <span>The Servelec Technologies TBox Remote Terminal Unit provides real-time remote access and control of your assets. It supports Modbus TCP/IP (Ethernet) and Modbus RTU (RS-485) protocols. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701264">https://www.tenable.com/plugins/nnm/701264</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Citrix ADC and Citrix NetScaler Gateway Arbitrary Code Execution (CTX267027)]]></title>
            <link>https://www.tenable.com/plugins/nnm/701262</link>
            <guid>https://www.tenable.com/plugins/nnm/701262</guid>
            <pubDate>Wed, 22 Jan 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701262 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is affected by a buffer overflow vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The remote Citrix ADC or Citrix NetScaler Gateway device is affected by an arbitrary code execution vulnerability. An unauthenticated, remote attacker may be able to leverage this vulnerability to perform arbitrary code execution on an affected host.<br /></span>
      <h3>Solution</h3>
      <span>For versions 11.1.x and 12.0.x, upgrade to 11.1.63.15 and 12.0.63.13 respectively. For all other versions, refer to vendor documentation for configuration mitigation.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701262">https://www.tenable.com/plugins/nnm/701262</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 68.4.1 Type Confusion (mfsa2020-03)]]></title>
            <link>https://www.tenable.com/plugins/nnm/701258</link>
            <guid>https://www.tenable.com/plugins/nnm/701258</guid>
            <pubDate>Wed, 08 Jan 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701258 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a type confusion vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Firefox ESR installed on the remote host is prior to 68.4.1. It is affected by following vulnerability as referenced in the mfsa2020-03 advisory:<br /></span><span><br /></span><span> - Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Mozilla Firefox ESR version 68.4.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701258">https://www.tenable.com/plugins/nnm/701258</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox < 72.0.1 Type Confusion (mfsa2020-03)]]></title>
            <link>https://www.tenable.com/plugins/nnm/701257</link>
            <guid>https://www.tenable.com/plugins/nnm/701257</guid>
            <pubDate>Wed, 08 Jan 2020 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701257 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote host is affected by a type confusion vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Firefox installed on the remote host is prior to 72.0.1. It is affected by following vulnerability as referenced in the mfsa2020-03 advisory:<br /></span><span><br /></span><span> - Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Mozilla Firefox version 72.0.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701257">https://www.tenable.com/plugins/nnm/701257</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Safari Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/7297</link>
            <guid>https://www.tenable.com/plugins/nnm/7297</guid>
            <pubDate>Thu, 14 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 7297 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Safari Detection Generator<br /></span>
      <h3>Description</h3>
      <span>The remote host is running Safari web browser.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/7297">https://www.tenable.com/plugins/nnm/7297</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/7296</link>
            <guid>https://www.tenable.com/plugins/nnm/7296</guid>
            <pubDate>Thu, 14 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 7296 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Apache Detection Generator<br /></span>
      <h3>Description</h3>
      <span>The remote host is running Apache Tomcat software.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/7296">https://www.tenable.com/plugins/nnm/7296</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Chrome Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/7290</link>
            <guid>https://www.tenable.com/plugins/nnm/7290</guid>
            <pubDate>Thu, 14 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 7290 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Chrome Detection Generator<br /></span>
      <h3>Description</h3>
      <span>The remote host is running Google Chrome web browser.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/7290">https://www.tenable.com/plugins/nnm/7290</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[PHP < 7.1.33 / 7.2.x < 7.2.24 / 7.3.x < 7.3.11 Remote Code Execution]]></title>
            <link>https://www.tenable.com/plugins/nnm/701235</link>
            <guid>https://www.tenable.com/plugins/nnm/701235</guid>
            <pubDate>Tue, 12 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701235 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote web server uses a version of PHP that is affected by a remote code execution vulnerability.<br /></span>
      <h3>Description</h3>
      <span>According to its banner, the version of PHP running on the remote web server is prior to 7.1.33, 7.2.x prior to 7.2.24, or 7.3.x prior to 7.3.11. It is, therefore, affected by a remote code execution vulnerability due to insufficient validation of user input. An unauthenticated, remote attacker can exploit this, by sending a specially crafted request, to cause the execution of arbitrary code by breaking the fastcgi_split_path_info directive.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to PHP version 7.3.11 or later. If 7.3.x cannot be obtained, 7.2.24 and 7.1.33 have also been patched for this vulnerability.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701235">https://www.tenable.com/plugins/nnm/701235</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens 6GK1411-6CA40-0BA0 IE/WSN-PA Link Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765353</link>
            <guid>https://www.tenable.com/plugins/nnm/765353</guid>
            <pubDate>Fri, 08 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765353 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens IE/WSN-PA Link Communication module has been detected with the model number 6GK1411-6CA40-0BA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK1411-6CA40-0BA0 is the IE/WSN-PA Link with N-Connector for connecting an external antenna and redundant operation. The IE/WSN-PA Link is a gateway that connects WirelessHART networks to Industrial Ethernet. On the radio side, the IE/WSN-PA Link supports the WirelessHART standard (HART V7.1), and on the Ethernet side it supports TCP/IP communication. The IE/WSN-PA Link supports the protocols TCP/IP and Modbus TCP/IP via the Ethernet interface. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765353">https://www.tenable.com/plugins/nnm/765353</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens 6GK1411-6CA40-0AA0 IE/WSN-PA Link Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765352</link>
            <guid>https://www.tenable.com/plugins/nnm/765352</guid>
            <pubDate>Fri, 08 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765352 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens IE/WSN-PA Link Communication module has been detected with the model number 6GK1411-6CA40-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK1411-6CA40-0AA0 is a IE/WSN-PA Link with integrated antenna. The IE/WSN-PA Link is a gateway that connects WirelessHART networks to Industrial Ethernet. On the radio side, the IE/WSN-PA Link supports the WirelessHART standard (HART V7.1), and on the Ethernet side it supports TCP/IP communication. The IE/WSN-PA Link supports the protocols TCP/IP and Modbus TCP/IP via the Ethernet interface. It also features an RS 485 interface with the Modbus RTU protocol.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765352">https://www.tenable.com/plugins/nnm/765352</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC TDC CP51M1 6DD1661-0AE1 Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765351</link>
            <guid>https://www.tenable.com/plugins/nnm/765351</guid>
            <pubDate>Fri, 08 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765351 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC TDC CP51M1 Communication module has been detected with the model number 6DD1661-0AE1.<br /></span>
      <h3>Description</h3>
      <span>The 6DD1661-0AE1 described by Siemens as SIMATIC TDC Communication module CP51M1 for Industrial Ethernet with TCP/IP and/or UDP.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765351">https://www.tenable.com/plugins/nnm/765351</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC Compact Field Unit PA Edition PROFINET Interface Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765350</link>
            <guid>https://www.tenable.com/plugins/nnm/765350</guid>
            <pubDate>Fri, 08 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765350 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A SIMATIC Compact Field Unit PA Edition PROFINET Interface has been detected with the model number 6ES7655-5PX11-0XX0.<br /></span>
      <h3>Description</h3>
      <span>The 6ES7655-5PX11-0XX0 is described by Siemens as SIMATIC Compact Field Unit PA Edition with 16x I/O channels PROFINET interface V2.3 (RT) Use of PROFINET bus adapter Media redundancy (MRP) PROFINET system redundancy (S2) Configuration in Run (CiR) Process interfaces: 8x PROFIBUS PA and 8x freely configurable DIQ Installation up to hazardous zone 2, Conformal coating, Mounting on 35 mm standard mounting rail.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765350">https://www.tenable.com/plugins/nnm/765350</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens IE/WSN-PA Link WirelessHART Gateway Cross-site Scripting (ICSA-19-253-04)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720317</link>
            <guid>https://www.tenable.com/plugins/nnm/720317</guid>
            <pubDate>Fri, 08 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720317 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Cross-site Scripting vulnerability (CWE-79) has been identified in Siemens IE/WSN-PA Link WirelessHART Gateway.<br /></span>
      <h3>Description</h3>
      <span>An attacker sending a malicious link to an unsuspecting user may be able to execute a cross-site scripting attack, which may allow information disclosure, code execution, or denial-of-service.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720317">https://www.tenable.com/plugins/nnm/720317</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC TDC CP51M1 Improper Input Validation (ICSA-19-253-05)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720316</link>
            <guid>https://www.tenable.com/plugins/nnm/720316</guid>
            <pubDate>Fri, 08 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720316 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Improper Input Validation vulnerability has been identified in Siemens SIMATIC TDC CP51M1.<br /></span>
      <h3>Description</h3>
      <span>An attacker sending a specially crafted UDP packet to the device may affect the UDP communication, causing a denial-of-service condition.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720316">https://www.tenable.com/plugins/nnm/720316</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701256</link>
            <guid>https://www.tenable.com/plugins/nnm/701256</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701256 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR versions earlier than 24.1 are affected by the following vulnerabilities :<br /></span><span><br /></span><span> - Miscellaneous use-after-free issues in the browsing engine (CVE-2013-5599, CVE-2013-5600, CVE-2013-5601)<br /></span><span> - Memory corruption in the Javascript engine when using workers with direct proxy (CVE-2013-5602)<br /></span><span> - Use-after-free issues when interacting with HTML templates (CVE-2013-5603)<br /></span><span> - Security bypass via iframe injection using PDF.js (CVE-2013-5598)<br /></span><span> - Miscellaneous memory safety issues in the browser engine (CVE-2013-5590, CVE-2013-5591, CVE-2013-5592, CVE-2013-1739)<br /></span><span> - Address spoofing in the addressbar via SELECT element, which can lead to clickjacking and other spoof attacks (CVE-2013-5593)<br /></span><span> - Access violation due to uninitialized data in XSLT processing (CVE-2013-5604)<br /></span><span> - Potential buffer/memory overflows in the Javascript engine (CVE-2013-5595)<br /></span><span> - Race condition causing a crash on extremely large pages (CVE-2013-5596)<br /></span><span> - A use-after-free issue during state change events when updating the offline cache (CVE-2013-5597)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR versions 24.1, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701256">https://www.tenable.com/plugins/nnm/701256</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 31.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701255</link>
            <guid>https://www.tenable.com/plugins/nnm/701255</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701255 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 31.7 are unpatched for the following vulnerabilities : <br /></span><span><br /></span><span> - A privilege escalation vulnerability exists in the Inter-process Communications (IPC) implementation due to a failure to validate the identity of a listener process. (MFSA2015-57) <br /></span><span> - An issue exists in the Mozilla updater in which DLL files in the current working directory or Windows temporary directories will be loaded, allowing the execution of arbitrary code. (CVE-2015-0833, CVE-2015-2720) <br /></span><span> - Multiple memory corruption issues exist within the browser engine. A remote attacker can exploit these to corrupt memory and execute arbitrary code. (CVE-2015-2708, CVE-2015-2709) <br /></span><span> - A buffer overflow condition exists in 'SVGTextFrame.cpp' when rendering SVG graphics that are combined with certain CSS properties due to improper validation of user-supplied input. A remote attacker can exploit this to cause a heap-based buffer overflow, resulting in the execution of arbitrary code. (CVE-2015-2710) <br /></span><span> - A security bypass vulnerability exists due to the referrer policy not being enforced in certain situations when opening links (e.g. using the context menu or a middle-clicks by mouse). A remote attacker can exploit this to bypass intended policy settings. (CVE-2015-2711) <br /></span><span> - An out-of-bounds read and write issue exists in the 'CheckHeapLengthCondition()' function due to improper JavaScript validation of heap lengths. A remote attacker can exploit this, via a specially crafted web page, to disclose memory contents. (CVE-2015-2712) <br /></span><span> - A use-after-free error exists due to improper processing of text when vertical text is enabled. A remote attacker can exploit this to dereference already freed memory. (CVE-2015-2713) - A use-after-free error exists in the 'RegisterCurrentThread()' function in 'nsThreadManager.cpp' due to a race condition related to media decoder threads created during the shutdown process. A remote attacker can exploit this to dereference already freed memory. (CVE-2015-2715) <br /></span><span> - A buffer overflow condition exists in the 'XML_GetBuffer()' function in xmlparse.c due to improper validation of user-supplied input when handling compressed XML content. An attacker can exploit this to cause a buffer overflow, resulting in the execution of arbitrary code. (CVE-2015-2716) <br /></span><span> - An integer overflow condition exists in the 'parseChunk()' function in 'MPEG4Extractor.cpp' due to improper handling of MP4 video metadata in chunks. A remote attacker can exploit this, via specially crafted media content, to cause a heap-based buffer overflow, resulting in the execution of arbitrary code. (CVE-2015-2717) <br /></span><span> - A security bypass vulnerability exists in 'WebChannel.jsm' due to improper handling of message traffic. An untrusted page hosting a trusted page within an iframe can intercept webchannel responses for the trusted page. This allows a remote attacker, via a specially crafted web page, to bypass origin restrictions, resulting in the disclosure of sensitive information. (CVE-2015-2718) <br /></span><span> - Multiple integer overflow conditions exist in the bundled libstagefright component due to improper validation of user-supplied input when processing MPEG4 sample metadata. A remote attacker can exploit this, via specially crafted media content, to execute arbitrary code. (CVE-2015-4496)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 31.7, or later. <br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701255">https://www.tenable.com/plugins/nnm/701255</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 31.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701254</link>
            <guid>https://www.tenable.com/plugins/nnm/701254</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701254 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 31.6 are unpatched for the following vulnerabilities : <br /></span><span><br /></span><span> - A privilege escalation vulnerability exists which relates to anchor navigation. A remote attacker can exploit this to bypass same-origin policy protections, allowing a possible execution of arbitrary scripts in a privileged context. Note that this is a variant of CVE-2015-0818 that was fixed in Firefox 36.0.4. (CVE-2015-0801)<br /></span><span> - Access to certain privileged internal methods is retained when navigating from windows created to contain privileged UI content to unprivileged pages. An attacker can exploit this to execute arbitrary JavaScript with elevated privileges. (CVE-2015-0802)<br /></span><span> - Multiple type confusion issues exist that can lead to use-after-free errors, which a remote attacker can exploit to execute arbitrary code or cause a denial of service. (CVE-2015-0803, CVE-2015-0804)<br /></span><span> - Multiple memory corruption issues exist related to off-main-thread compositing when rendering 2D graphics, which a remote attacker can exploit to execute arbitrary code or cause a denial of service. (CVE-2015-0805, CVE-2015-0806)<br /></span><span> - A cross-site request forgery (XSRF) vulnerability exists in the sendBeacon() function due to cross-origin resource sharing (CORS) requests following 30x redirections. (CVE-2015-0807)<br /></span><span> - An issue exists in WebRTC related to memory management for simple-style arrays, which may be used by a remote attacker to cause a denial of service. (CVE-2015-0808)<br /></span><span> - An issue exists that allows a remote attacker to make the user's cursor invisible, possibly resulting in a successful clickjacking attack. Only OS X installations of Firefox are affected. (CVE-2015-0810)<br /></span><span> - An out-of-bounds read issue exists in the QCMS color management library that could lead to an information disclosure. (CVE-2015-0811)<br /></span><span> - An issue exists that can allow a man-in-the-middle attacker to bypass user-confirmation and install a Firefox lightweight theme by spoofing a Mozilla sub-domain. (CVE-2015-0812)<br /></span><span> - A use-after-free vulnerability affects the AppendElements() function when the Fluendo MP3 plugin for GStreamer is used. A remote attacker could exploit this to execute arbitrary code or cause a denial of service (heap memory corruption) via a specially crafted MP3 file. (CVE-2015-0813)<br /></span><span> - Multiple memory safety issues exist within the browser engine. A remote attacker can exploit these to corrupt memory and possibly execute arbitrary code. (CVE-2015-0814, CVE-2015-0815)<br /></span><span> - A privilege escalation vulnerability exists related to documents loaded through a 'resource:' URL. An attacker can exploit this to load pages and execute JavaScript with elevated privileges. (CVE-2015-0816)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 31.6, or later. <br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701254">https://www.tenable.com/plugins/nnm/701254</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 31.5.2 JIT Code Execution]]></title>
            <link>https://www.tenable.com/plugins/nnm/701253</link>
            <guid>https://www.tenable.com/plugins/nnm/701253</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701253 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser that is affected by a remote code execution vulnerability.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 31.5.2 are affected by a remote code execution vulnerability due to an out-of-bounds error in typed array bounds checking within 'asmjs/AsmJSValidate.cpp', which relates to just-in-time compilation for JavaScript. A remote attacker, using a specially crafted web page, can exploit this to execute arbitrary code by reading and writing to memory.  <br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 31.5.2, or later. <br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701253">https://www.tenable.com/plugins/nnm/701253</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 31.5.3 SVG Bypass Privilege Escalation]]></title>
            <link>https://www.tenable.com/plugins/nnm/701252</link>
            <guid>https://www.tenable.com/plugins/nnm/701252</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701252 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host contains a web browser that is affected by a privilege escalation vulnerability.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 31.5.3are affected by a privilege escalation vulnerability due to a flaw within 'docshell/base/nsDocShell.cpp', which relates to SVG format content navigation. A remote attacker can exploit this to bypass same-origin policy protections, allowing a possible execution of arbitrary scripts in a privileged context.  <br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 31.5.3, or later. <br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701252">https://www.tenable.com/plugins/nnm/701252</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 31.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701251</link>
            <guid>https://www.tenable.com/plugins/nnm/701251</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701251 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 31.5 are unpatched for the following vulnerabilities : <br /></span><span><br /></span><span> - An information disclosure vulnerability exists related to the autocomplete feature that allows an attacker to read arbitrary files. (CVE-2015-0822)<br /></span><span> - An out-of-bounds read and write issue exists when processing invalid SVG graphic files. This allows an attacker to disclose sensitive information. (CVE-2015-0827)<br /></span><span> - A use-after-free issue exists when running specific web content with 'IndexedDB' to create an index, resulting in a denial of service condition or arbitrary code execution. (CVE-2015-0831)<br /></span><span> - An issue exists in the Mozilla updater in which DLL files in the current working directory or Windows temporary directories will be loaded, allowing the execution of arbitrary code. Note that hosts are only affected if the updater is not run by the Mozilla Maintenance Service. (CVE-2015-0833)<br /></span><span> - Multiple unspecified memory safety issues exist within the browser engine. (CVE-2015-0835, CVE-2015-0836)<br /></span><span><br /></span><span><br /></span><span>NOTE : The following vulnerabilities exist only within the stable release, and do not affect any Firefox ESR releases :<br /></span><span><br /></span><span> - An issue exists when a period is appended to a hostname that results in a bypass of the Public Key Pinning Extension for HTTP (HPKP) and HTTP Strict Transport Security (HSTS) when certificate pinning is set to strict mode. An attacker can exploit this issue to perform man-in-the-middle attacks if the attacker has a security certificate for a domain with the added period. (CVE-2015-0832)<br /></span><span> - An unspecified issue exists that allows an attacker, via specially crafted WebGL content, to cause a denial of service condition. (CVE-2015-0830)<br /></span><span> - An information disclosure vulnerability exists due to the lack of TLS support for connections to TURN and STUN servers, resulting in plaintext connections. (CVE-2015-0834)<br /></span><span> - A buffer overflow issue exists in the 'libstagefright' library when processing invalid MP4 video files, resulting in a denial of service condition or arbitrary code execution. (CVE-2015-0829)<br /></span><span> - A double-free issue exists when sending a zero-length 'XmlHttpRequest' (XHR) object due to errors in memory allocation when using different memory allocator libraries than 'jemalloc'. This allows an attacker to crash the application. (CVE-2015-0828)<br /></span><span> - A buffer underflow issue exists during audio playback of invalid MP3 audio files. (CVE-2015-0825)<br /></span><span> - An out-of-bounds read issue exists while restyling and reflowing changes of web content with CSS, resulting in a denial of service condition or arbitrary code execution. (CVE-2015-0826)<br /></span><span> - An issue exists in the 'DrawTarget()' function of the Cairo graphics library that allows an attacker cause a segmentation fault, resulting in a denial of service. (CVE-2015-0824)<br /></span><span> - A use-after-free error exists with the OpenType Sanitiser (OTS) when expanding macros. (CVE-2015-0823)<br /></span><span> - An issue exists when opening hyperlinks on a page with the mouse and specific keyboard key combinations that allows a Chrome privileged URL to be opened without context restrictions being preserved. Additionally, the issue allows the opening of local files and resources from a known location to be opened with local privileges, bypassing security protections. (CVE-2015-0821)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 31.5, or later. <br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701251">https://www.tenable.com/plugins/nnm/701251</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 31.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701250</link>
            <guid>https://www.tenable.com/plugins/nnm/701250</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701250 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 31.4 are unpatched for the following vulnerabilities : <br /></span><span><br /></span><span> - Multiple unspecified memory safety issues exist within the browser engine. (CVE-2014-8634, CVE-2014-8635)<br /></span><span> - A flaw exists where DOM objects with some specific properties can bypass XrayWrappers. This can allow web content to confuse privileged code, potentially enabling privilege escalation. (CVE-2014-8636)<br /></span><span> - A flaw exists in the rendering of bitmap images. When rending a malformed bitmap image, memory may not always be properly initialized, which can result in a leakage of data to web content. (CVE-2014-8637)<br /></span><span> - A flaw exists in 'navigator.sendBeacon()' in which it does not follow the cross-origin resource sharing specification. This results in requests from 'sendBeacon()' lacking an 'origin' header, which allows malicious sites to perform XSRF attacks. (CVE-2014-8638)<br /></span><span> - A flaw exists when receiving 407 Proxy Authentication responses with a 'set-cookie' header. This can allow a session-fixation attack. (CVE-2014-8639)<br /></span><span> - A flaw exists in Web Audio that can allow a small block of memory to be read. (CVE-2014-8640)<br /></span><span> - A read-after-free flaw exists in WebRTC due to the way tracks are handled, which can result in a potentially exploitable crash or incorrect WebRTC behavior. (CVE-2014-8641)<br /></span><span> - A flaw exists where delegated Online Certificate Status Protocol responder certificates fail to recognize the id-pkix-ocsp-nocheck extension. This can result in a user connecting to a site with a revoked certificate. (CVE-2014-8642)<br /></span><span> - A flaw exists in the Gecko Media Plugin which can allow an attacker to break out of the sandbox. (CVE-2014-8643)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 31.4, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701250">https://www.tenable.com/plugins/nnm/701250</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 31.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701249</link>
            <guid>https://www.tenable.com/plugins/nnm/701249</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701249 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR earlier than 31.3 are unpatched for the following vulnerabilities :<br /></span><span><br /></span><span> - Security Bypass that can be leveraged when processing specially crafted Chrome-based CSS stylesheets with improperly declared namespaces. (CVE-2014-1589)<br /></span><span> - Information Disclosure due to the way Content Security Policy leaks data through violation reports. (CVE-2014-1591)<br /></span><span> - Multiple Unspecified Memory Corruption Vulnerabilities. (CVE-2014-1587)(CVE-2014-1588)<br /></span><span> - Multiple Local Information Disclosure Vulnerabilities requiring interactive access to exploit. (CVE-2014-1595)<br /></span><span> - Security Vulnerability due to bad casting from 'BasicThebesLayer' to 'BasicContainerLayer'. (CVE-2014-1594)<br /></span><span> - Denial of Service Vulnerability can occur when passing a js object to 'XMLHttpRequest' that mimics an input stream. (CVE-2014-1590)<br /></span><span> - Use After Free Memory Corruption Vulnerability when creating a second root element during the parsing of an HTML5 document which contains 'document.open()'. (CVE-2014-1592)<br /></span><span> - Buffer Overflow Vulnerability when handling specially crafted media content. (CVE-2014-1593)<br /></span><span> - A flaw exists and is triggered as 'XrayWrappers' filter objects are not properly validated when stored in the program. This may allow a context-dependent attacker to bypass security protection mechanisms. (CVE-2014-8632)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 31.3, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701249">https://www.tenable.com/plugins/nnm/701249</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 31.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701248</link>
            <guid>https://www.tenable.com/plugins/nnm/701248</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701248 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 31.1 are unpatched for the following vulnerabilities :<br /></span><span><br /></span><span> - Buffer overflow vulnerability exists when capitalization style changes occur during CSS parsing. (CVE-2014-1576)<br /></span><span> - Out-of-bounds read error in the Web Audio component when invalid values are used in custom waveforms can lead to denial of service or information disclosure. (CVE-2014-1577)<br /></span><span> - Out-of-bounds write error when processing invalid tile sizes in 'WebM' format videos can be leveraged for arbitrary code execution. (CVE-2014-1578)<br /></span><span> - Memory is not properly initialized during GIF rendering within a '<canvas>' element, which can be leveraged via a specially crafted web script to acquire sensitive information from the process memory. (CVE-2014-1580)<br /></span><span> - Use-after-free error in the 'DirectionalityUtils' component when text direction is used in the text layout can be leveraged for arbitrary code execution. (CVE-2014-1581)<br /></span><span> - Multiple security bypass vulnerabilities exist in the implementation of Public Key Pinning (PKP); one issue can be triggered via SPDY's or HTTP/2's connection-coalescing property in the case of a shared IP address, and another issue is exposed by an unspecified issuer-verification error. Both scenarios can be leveraged for man-in-the-middle attacks. Note that key pinning was introduced in Firefox 32. (CVE-2014-1582, CVE-2014-1584)<br /></span><span> - A cross-origin policy bypass exists that could allow a malicious app to use 'AlarmAPI' to read cross-origin references and possibly perform unauthorized actions through the victim user's session. (CVE-2014-1583)<br /></span><span> - Multiple issues exist in WebRTC when the session is running within an 'iframe' element that will allow the session to be accessible even when sharing is stopped and when returning to the website. This could result in the video inadvertently being shared. (CVE-2014-1585, CVE-2014-1586)<br /></span><span> - Multiple memory safety flaws exist within the browser engine, which can likely be leveraged for denial of service or arbitrary code execution. (CVE-2014-1574, CVE-2014-1575)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 31.2, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701248">https://www.tenable.com/plugins/nnm/701248</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.8 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701247</link>
            <guid>https://www.tenable.com/plugins/nnm/701247</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701247 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 24.8 are unpatched for the following vulnerabilities :<br /></span><span><br /></span><span> - Use-after-free vulnerabilities -- when setting text direction, and when interacting with SVG content through the DOM -- which can be leveraged for arbitrary code execution (CVE-2014-1567, CVE-2014-1563)<br /></span><span> - Out-of-bounds read in the Web Audio audio timeline that can trigger a crash and potentially disclose memory content (CVE-2014-1565)<br /></span><span> - Incomplete memory initialization when rendering a malformed GIF image could expose that memory to scripts via web content using the '<canvas>' feature, resulting in information disclosure (CVE-2014-1564)<br /></span><span> - Other undisclosed memory issues that have since been patched (CVE-2014-1553, CVE-2014-1554, CVE-2014-1562)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 24.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701247">https://www.tenable.com/plugins/nnm/701247</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701246</link>
            <guid>https://www.tenable.com/plugins/nnm/701246</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701246 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR earlier than 24.7 are unpatched for the following vulnerabilities :<br /></span><span><br /></span><span> - An exploitable crash when using the Cesium JavaScript library to generate WebGL content could be leveraged to execute arbitrary code (CVE-2014-1556)<br /></span><span> - A potentially exploitable crash when scaling high quality images, due to image data being discarded while in use by the scaling operation (CVE-2014-1557)<br /></span><span> - Use-after-free errors when handling certificates in the trusted cache, triggering a FireOnStateChang event in certain circumstances, when rendering MathML content in DirectWrite handling certain fonts, and buffering Web Audio playback can be leveraged to crash the application and, in some cases, execute arbitrary code (CVE-2014-1544, CVE-2014-1555, CVE-2014-1551, CVE-2014-1550)<br /></span><span> - Bypass of the iframe element sandbox via network-level redirects, which can allow unauthorized access to content without explicit approval (CVE-2014-1552)<br /></span><span> - Issues with parsing SSL certificates when non-standard characters are present, which can lead to a potential inability to use valid SSL certificates (CVE-2014-1558, CVE-2014-1559, CVE-2014-1560)<br /></span><span> - Potentially exploitable buffer overflow when interacting with Web Audio buffer for playback, due to an error in the amount of memory allocated for buffers (CVE-2014-1549)<br /></span><span> - Other miscellaneous memory issues that have since been fixed (CVE-2014-1547, CVE-2014-1548)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 24.7, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701246">https://www.tenable.com/plugins/nnm/701246</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.6 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701245</link>
            <guid>https://www.tenable.com/plugins/nnm/701245</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701245 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 24.6 are unpatched against the following vulnerabilities :<br /></span><span><br /></span><span> - Buffer overflows due to insufficient input validation in Gamepad API and Web Audio Speex resampler, which can be leveraged to execute arbitrary code or cause denial of service conditions (CVE-2014-1543, CVE-2014-1542)<br /></span><span> - Use-after-free errors in SMIL Animation Controller, Event Listener Manager, and various other locations, which may be triggered via web content to cause a potentially exploitable crash (CVE-2014-1540, CVE-2014-1539, CVE-2014-1536, CVE-2014-1537)<br /></span><span> - Clickjacking through cursor invisibility when the cursor leaves the embedded flash object (OS X platform only) (CVE-2014-1539)<br /></span><span> - Miscellaneous memory safety hazards (CVE-2014-1533, CVE-2014-1534)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR versions 24.6, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701245">https://www.tenable.com/plugins/nnm/701245</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701244</link>
            <guid>https://www.tenable.com/plugins/nnm/701244</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701244 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 24.5 are unpatched against the following vulnerabilities :<br /></span><span><br /></span><span> - Use-after-free vulnerabilities in nsHostResolver, imgLoader, and Text Track Manager (for HTML video), which can crash with a potentially exploitable condition (CVE-2014-1532, CVE-2014-1531, CVE-2014-1525)<br /></span><span> - A potentially exploitable out-of-bounds write in Cairo, a potentially exploitable out-of-bounds read issue with Web Audio, and a non-exploitable out-of-bounds read when decoding JPG images (CVE-2014-1528, CVE-2014-1522, CVE-2014-1523)<br /></span><span> - Improper wildcard matching of domains in the Network Security Services (NSS library), which has since been fixed by updating to version 3.16 (CVE-2014-1492)<br /></span><span> - Potential privilege escalation via Xray Wrappers bypass, which can occur if a user used the debugger to interact with a malicious page (CVE-2014-1526)<br /></span><span> - Privilege escalation for scripts when sites that have been granted notification permissions by a user can bypass security checks on source components for the Web Notification API (CVE-2014-1529)<br /></span><span> - Privilege escalation via the Mozilla Maintenance Service Installer, which writes to a globally writeable temporary directory during the update process (Windows only) (CVE-2014-1520)<br /></span><span> - A potentially exploitable buffer overflow when a script uses a non-XBL object as an XBL object (CVE-2014-1524)<br /></span><span> - A cross-site scripting vulnerability using browser navigations through history to load a website with the page's base URI pointing to a different site (CVE-2014-1530)<br /></span><span> - Various memory safety hazards (CVE-2014-1518, CVE-2014-1519)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR versions 24.5, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701244">https://www.tenable.com/plugins/nnm/701244</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701243</link>
            <guid>https://www.tenable.com/plugins/nnm/701243</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701243 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Mozilla Firefox ESR version 24.4 is now patched against multiple vulnerabilities, the most critical of which include:<br /></span><span><br /></span><span> - Out-of-bounds read/write access through ArrayBuffer objects, as well as out-of-bounds write access through TypedArrayObject, which enable remote code execution (CVE-2014-1513, CVE-2014-1514)<br /></span><span> - Use-after-free error in TypeObject due to possible memory corruption during Garbage Collection in the JS engine, which can be exploited for arbitrary code execution (CVE-2014-1512)<br /></span><span> - Privilege escalation using Web-IDL to call JS function 'window.open()', as well as a bug allowing bypass of the popup-blocker without user interaction, could allow an attacker to run arbitrary code with full privileges of the browser (CVE-2014-1510, CVE-2014-1511)<br /></span><span> - Out-of-bounds read during polygon rendering in MathML can be leveraged for information disclosure of protected memory address, especially when combined with timing attacks via SVG filters and displacement input to 'feDisplacementMap' (CVE-2014-1505, CVE-2014-1508)<br /></span><span> - Out-of-bounds read access during WAV file decoding could allow web countent to access heap data or cause a crash (CVE-2014-1497)<br /></span><span><br /></span><span> - Miscellaneous memory safety hazards (CVE-2014-1493, CVE-2014-1494)<br /></span><span><br /></span><span>Additionally, numerous other vulnerabilities have been patched. See reference links for details.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR versions 24.4, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701243">https://www.tenable.com/plugins/nnm/701243</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.3 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701242</link>
            <guid>https://www.tenable.com/plugins/nnm/701242</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701242 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 24.3 are prone to the following vulnerabilities :<br /></span><span><br /></span><span> - Memory issues exist in the browser engine that could result in a denial of service or arbitrary code execution. (CVE-2014-1477, CVE-2014-1478)<br /></span><span> - An error exists related to System Only Wrappers (SOW) and the XML Binding Language (XBL) that could allow XUL content to be disclosed. (CVE-2014-1479)<br /></span><span> - An error exists related to the 'open file' dialog that could allow users to take unintended actions. (CVE-2014-1480)<br /></span><span> - An error exists related to the JavaScript engine and 'window' object handling that has unspecified impact. (CVE-2014-1481)<br /></span><span> - An error exists related to 'RasterImage' and image decoding that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1482)<br /></span><span> - Errors exist related to IFrames, 'document.caretPositionFromPoint' and 'document.elementFromPoint' that could allow cross-origin information disclosure. (CVE-2014-1483)<br /></span><span> - An error exists related to the Content Security Policy (CSP) and XSLT stylesheets that could allow unintended script execution. (CVE-2014-1485)<br /></span><span> - A use-after-free error exists related to image handling and 'imgRequestProxy' that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1486)<br /></span><span> - An error exists related to 'web workers' that could allow cross-origin information disclosure. (CVE-2014-1487)<br /></span><span> - An error exists related to 'web workers' and 'asm.js' that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1488)<br /></span><span> - An error exists that could allow webpages to access activate content from the 'about:home' page that could lead to data loss. (CVE-2014-1489)<br /></span><span> - Errors exist related to the included Network Security Services (NSS) libraries, 'NewSessionTicket' handshakes and public Diffie-Hellman values that could allow application crashes and possibly arbitrary code execution. (CVE-2014-1490, CVE-2014-1491)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR versions 24.3, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701242">https://www.tenable.com/plugins/nnm/701242</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.2 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701241</link>
            <guid>https://www.tenable.com/plugins/nnm/701241</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701241 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 24.2 are prone to the following vulnerabilities :<br /></span><span><br /></span><span> - Miscellaneous memory safety hazards (CVE-2013-5609, CVE-2013-5610)<br /></span><span> - Application Installation doorhanger does not get properly dismissed, which can be leveraged to trick a user into installing an application from one site while thinking it originated from another (CVE-2013-5611)<br /></span><span> - Potential XSS vulnerability via cross-domain inheritance of charset (CVE-2013-5612)<br /></span><span> - Sandbox restrictions are not properly applied to nested object elements, which could be leveraged to bypass restrictions (CVE-2013-5614)<br /></span><span> - Use-after-free in event listeners, table editing user interface, synthetic mouse movement can lead to a potentially exploitable crash (CVE-2013-5616, CVE-2013-5613, CVE-2013-5618)<br /></span><span> - Binary search algorithms in the Javascript engine contain potential out-of-bounds array access, though these are not directly exploitable (CVE-2013-5619)<br /></span><span> - Segmentation violation when replacing ordered list elements in a document via script can lead to a potentially exploitable crash (CVE-2013-6671)<br /></span><span> - On Linux systems, clipboard content may be made accessible to web content when a user pastes a selection with a middle-click, which can lead to information disclosure (CVE-2013-6672)<br /></span><span> - Extended validation root certificates remain trusted even if the user has explicitly removes the trust. (CVE-2013-6673)<br /></span><span> - GetElementIC typed arrays can be generated outside observed typesets, with unknown security impact (CVE-2013-5615)<br /></span><span> - Issues in the JPEG image processing library can allow arbitrary memory to be read, as well as cross-domain theft (CVE-2013-6629, CVE-2013-6630)<br /></span><span> - An intermediary CA that is chained up to a root within Mozilla's root store was revoked for supplying an intermediate certificate that allowed a man-in-the-middle proxy to perform traffic management of domain names and IP addresses the certificate holder did not own or control.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701241">https://www.tenable.com/plugins/nnm/701241</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701240</link>
            <guid>https://www.tenable.com/plugins/nnm/701240</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701240 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web server installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to version 24.7 are unpatched for the following vulnerabilities :<br /></span><span><br /></span><span> - An exploitable crash when using the Cesium JavaScript library to generate WebGL content could be leveraged to execute arbitrary code (CVE-2014-1556)<br /></span><span> - A potentially exploitable crash when scaling high quality images, due to image data being discarded while in use by the scaling operation (CVE-2014-1557)<br /></span><span> - Use-after-free errors when handling certificates in the trusted cache, triggering a FireOnStateChang event in certain circumstances, when rendering MathML content in DirectWrite handling certain fonts, and buffering Web Audio playback can be leveraged to crash the application and, in some cases, execute arbitrary code (CVE-2014-1544, CVE-2014-1555, CVE-2014-1551, CVE-2014-1550)<br /></span><span> - Bypass of the iframe element sandbox via network-level redirects, which can allow unauthorized access to content without explicit approval (CVE-2014-1552)<br /></span><span> - Issues with parsing SSL certificates when non-standard characters are present, which can lead to a potential inability to use valid SSL certificates (CVE-2014-1558, CVE-2014-1559, CVE-2014-1560)<br /></span><span> - Potentially exploitable buffer overflow when interacting with Web Audio buffer for playback, due to an error in the amount of memory allocated for buffers (CVE-2014-1549)<br /></span><span> - Other miscellaneous memory issues that have since been fixed (CVE-2014-1547, CVE-2014-1548)<br /></span><span><br /></span><span>While most of these vulnerabilities are browser-oriented, Thunderbird's built-in browser capabilities may be susceptible vectors for attack.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 24.7, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701240">https://www.tenable.com/plugins/nnm/701240</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 17.0.10 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701239</link>
            <guid>https://www.tenable.com/plugins/nnm/701239</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701239 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has a web browser installed that is vulnerable to multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to version 17.0.10 are prone to the following vulnerabilities :<br /></span><span><br /></span><span> - Miscellaneous use-after-free issues in the browsing engine (CVE-2013-5599, CVE-2013-5600, CVE-2013-5601)<br /></span><span> - Memory corruption in the Javascript engine when using workers with direct proxy (CVE-2013-5602)<br /></span><span> - Use-after-free issues when interacting with HTML templates (CVE-2013-5603)<br /></span><span> - Security bypass via iframe injection using PDF.js (CVE-2013-5598)<br /></span><span> - Miscellaneous memory safety issues in the browser engine (CVE-2013-5590, CVE-2013-5591, CVE-2013-5592, CVE-2013-1739)<br /></span><span> - Address spoofing in the addressbar via SELECT element, which can lead to clickjacking and other spoof attacks (CVE-2013-5593)<br /></span><span> - Access violation due to uninitialized data in XSLT processing (CVE-2013-5604)<br /></span><span> - Potential buffer/memory overflows in the Javascript engine (CVE-2013-5595)<br /></span><span> - Race condition causing a crash on extremely large pages (CVE-2013-5596)<br /></span><span> - A use-after-free issue during state change events when updating the offline cache (CVE-2013-5597)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 17.0.10, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701239">https://www.tenable.com/plugins/nnm/701239</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 24.8.1 RSA Signature Forgery in NSS]]></title>
            <link>https://www.tenable.com/plugins/nnm/701238</link>
            <guid>https://www.tenable.com/plugins/nnm/701238</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701238 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is running a web browser that is vulnerable to a critical issue within the Network Security Services (NSS) library.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to version 24.8.1 utilize a vulnerable version of the Network Security Services library for cryptographic functionality. The issue occurs from incorrectly check on signature padding, leading to potential signature forgery that can be leveraged for man-in-the-middle attacks over SSL.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 24.8.1, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701238">https://www.tenable.com/plugins/nnm/701238</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox ESR < 17.0.9 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701237</link>
            <guid>https://www.tenable.com/plugins/nnm/701237</guid>
            <pubDate>Wed, 06 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701237 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is utilizing a web browser that is affected by multiple attack vectors.<br /></span>
      <h3>Description</h3>
      <span>Versions of Mozilla Firefox ESR prior to 17.0.9 are prone to the following vulnerabilities :<br /></span><span><br /></span><span> - use-after-free vulnerability in the Garbage Collector could allow a remote attacker to execute arbitrary code in the context of the user. (CVE-2013-1738)<br /></span><span> - user-defined getters on DOM proxies would incorrectly get the expando object when accessing the "this" object, which may not be directly exploitable but could lead to incorrect security sensitive decisions. (CVE-2013-1737)<br /></span><span> - Combining lists, floats, and multiple columns in a layout could trigger a potentially exploitable buffer overflow. (CVE-2013-1732)<br /></span><span> - Compartment mismatch when moving XBL-backed nodes into a new document can lead cause a crash (CVE-2013-1730)<br /></span><span> - uninitialized data and variables in the IonMonkey Javascript engine can be used with additional exploits to allow access to previously allocated memory (CVE-2013-1728)<br /></span><span> - the MAR update file is not write-locked when used by the Mozilla Updater, which can allow the altering of the MAR file content after its signature has been checked but before it has been used. (CVE-2013-1726)<br /></span><span> - Calling scope for new Javascript objects with compartments can lead to memory corruption (CVE-2013-1725)<br /></span><span> - A use-after-free vulnerability via the <select> element could lead to a potentially exploitable crash (CVE-2013-1724)<br /></span><span> - the NativeKey widget continues handling key messages even when it is destroyed by dispatched event listeners, which can lead to an unexploitable crash (CVE-2013-1723)<br /></span><span> - Use-after-free in Animation Manager during stylesheet cloning can lead to a potentially exploitable crash (CVE-2013-1722)<br /></span><span> - Incorrectly stored stack information in the HTML5 Tree Builder can lead to code execution (CVE-2013-1720)<br /></span><span> - Various memory corruption vulnerabilities (CVE-2013-1735, CVE-2013-1736, CVE-2013-1718, CVE-2013-1719)<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Firefox ESR version 17.0.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701237">https://www.tenable.com/plugins/nnm/701237</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPLUS TIM 1531 IRC 6GK7543-1MX00-0XE0 Communications Adapter Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765349</link>
            <guid>https://www.tenable.com/plugins/nnm/765349</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765349 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6GK7543-1MX00-0XE0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK7543-1MX00-0XE0 is described as TIM 1531 IRC Communications module for SIMATIC S7-1500, S7-400, S7-300 with SINAUT ST7, DNP3 and IEC 60870-5-101/104 with three RJ45 interfaces for communication via IP-based networks (WAN / LAN) and a RS 232/RS 485 interface for communication via classic WAN networks.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765349">https://www.tenable.com/plugins/nnm/765349</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPLUS TIM 1531 IRC 6AG1543-1MX00-7XE0 Communications Adapter Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765348</link>
            <guid>https://www.tenable.com/plugins/nnm/765348</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765348 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6AG1543-1MX00-7XE0.<br /></span>
      <h3>Description</h3>
      <span>The 6AG1543-1MX00-7XE0 is described as SIPLUS TIM 1531 IRC communication module for SIMATIC S7-1500, S7-400, S7-300 with SINAUT ST7 with three RJ145 interfaces for communication via IP-based networks (WAN / LAN) and a RS-232/RS-485- Interface for Communications via classic WAN networks.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765348">https://www.tenable.com/plugins/nnm/765348</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-5AA30-0AA1 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765347</link>
            <guid>https://www.tenable.com/plugins/nnm/765347</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765347 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-5AA30-0AA1.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-5AA30-0AA1 is described as SINUMERIK 828D CNC-HARDWARE PPU 261.3 HORIZONTAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765347">https://www.tenable.com/plugins/nnm/765347</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-4AA30-0AA1 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765346</link>
            <guid>https://www.tenable.com/plugins/nnm/765346</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765346 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-4AA30-0AA1.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-4AA30-0AA1 is described as SINUMERIK 828D BASIC CNC-HARDWARE PPU 240.3 VERTIKAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765346">https://www.tenable.com/plugins/nnm/765346</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-3AA30-0AA1 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765345</link>
            <guid>https://www.tenable.com/plugins/nnm/765345</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765345 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-3AA30-0AA1.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-3AA30-0AA1 is described as SINUMERIK 828D BASIC CNC-HARDWARE PPU 241.3 HORIZONTAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765345">https://www.tenable.com/plugins/nnm/765345</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-8AA40-0BA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765344</link>
            <guid>https://www.tenable.com/plugins/nnm/765344</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765344 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-8AA40-0BA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-8AA40-0BA0 is described as SINUMERIK 828D NUMERICAL CONTROL CNC-HARDWARE PPU 290.4 VERTICAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765344">https://www.tenable.com/plugins/nnm/765344</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-8AA30-0BA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765343</link>
            <guid>https://www.tenable.com/plugins/nnm/765343</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765343 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-8AA30-0BA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-8AA30-0BA0 is described as SINUMERIK 828D CNC-HARDWARE PPU 290.3 VERTICAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765343">https://www.tenable.com/plugins/nnm/765343</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-8AA30-0AA1 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765342</link>
            <guid>https://www.tenable.com/plugins/nnm/765342</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765342 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-8AA30-0AA1.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-8AA30-0AA1 is described as SINUMERIK 828D CNC-HARDWARE PPU 280.3 VERTICAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765342">https://www.tenable.com/plugins/nnm/765342</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-7AA30-0AA1 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765341</link>
            <guid>https://www.tenable.com/plugins/nnm/765341</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765341 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-7AA30-0AA1.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-7AA30-0AA1 is described as SINUMERIK 828D CNC-HARDWARE PPU 281.3 HORIZONTAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765341">https://www.tenable.com/plugins/nnm/765341</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-6AA40-0WA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765340</link>
            <guid>https://www.tenable.com/plugins/nnm/765340</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765340 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-6AA40-0WA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-6AA40-0WA0 is described as SINUMERIK 828D CNC hardware PPU 270.4 ITROL vertical Without CNC software OEM style, identical functionality PPU270.4.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765340">https://www.tenable.com/plugins/nnm/765340</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-6AA40-0AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765339</link>
            <guid>https://www.tenable.com/plugins/nnm/765339</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765339 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-6AA40-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-6AA40-0AA0 is described as SINUMERIK 828D NUMERICAL CONTROL CNC-HARDWARE PPU 270.4 VERTICAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765339">https://www.tenable.com/plugins/nnm/765339</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-6AA30-0AA1 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765338</link>
            <guid>https://www.tenable.com/plugins/nnm/765338</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765338 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-6AA30-0AA1.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-6AA30-0AA1 is described as SINUMERIK 828D CNC-HARDWARE PPU 260.3 VERTICAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765338">https://www.tenable.com/plugins/nnm/765338</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-5AA40-0WA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765337</link>
            <guid>https://www.tenable.com/plugins/nnm/765337</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765337 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-5AA40-0WA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-5AA40-0WA0 is described as SINUMERIK 828D CNC-HARDWARE PPU 271.4 ITROL HORIZONTAL W/O CNC SOFTWARE OEM STYLE, FUNCTIONALLY IDENTICAL TO PPU271.4.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765337">https://www.tenable.com/plugins/nnm/765337</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 828D 6FC5370-5AA40-0AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765336</link>
            <guid>https://www.tenable.com/plugins/nnm/765336</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765336 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 828D HMI has been detected with model number 6FC5370-5AA40-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-5AA40-0AA0 is described as SINUMERIK 828D NUMERICAL CONTROL CNC-HARDWARE PPU 271.4 HORIZONTAL.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765336">https://www.tenable.com/plugins/nnm/765336</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5370-3BT03-0CA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765335</link>
            <guid>https://www.tenable.com/plugins/nnm/765335</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765335 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5370-3BT03-0CA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-3BT03-0CA0 is described as SINUMERIK 808D, Extended T PPU 150.3 vertical with current software version, English layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765335">https://www.tenable.com/plugins/nnm/765335</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5370-3BT03-0AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765334</link>
            <guid>https://www.tenable.com/plugins/nnm/765334</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765334 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5370-3BT03-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-3BT03-0AA0 is described as SINUMERIK 808D, Extended T PPU 150.3 vertical with current software version, English layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765334">https://www.tenable.com/plugins/nnm/765334</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5370-3BM03-0CA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765333</link>
            <guid>https://www.tenable.com/plugins/nnm/765333</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765333 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5370-3BM03-0CA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-3BM03-0CA0 is described as SINUMERIK 808D, Extended M PPU 150.3 vertical with current software version, Chinese layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765333">https://www.tenable.com/plugins/nnm/765333</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5370-3BM03-0AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765332</link>
            <guid>https://www.tenable.com/plugins/nnm/765332</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765332 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5370-3BM03-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-3BM03-0AA0 is described as SINUMERIK 808D, Extended M PPU 150.3 vertical with current software version, English layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765332">https://www.tenable.com/plugins/nnm/765332</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5370-2BM03-0CA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765331</link>
            <guid>https://www.tenable.com/plugins/nnm/765331</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765331 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5370-2BM03-0CA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-2BM03-0CA0 is described as SINUMERIK 808D, Extended T PPU 160.3 vertical with current software version, Chinese layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765331">https://www.tenable.com/plugins/nnm/765331</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5370-2BM03-0AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765330</link>
            <guid>https://www.tenable.com/plugins/nnm/765330</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765330 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5370-2BM03-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-2BM03-0AA0 is described as SINUMERIK 808D, Extended M PPU 160.3 vertical with current software version, English layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765330">https://www.tenable.com/plugins/nnm/765330</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5370-1AT03-0CA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765329</link>
            <guid>https://www.tenable.com/plugins/nnm/765329</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765329 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5370-1AT03-0CA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-1AT03-0CA0 is described as SINUMERIK 808D T PPU 141.3 horizontal with current software version, Chinese layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765329">https://www.tenable.com/plugins/nnm/765329</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5370-1AM03-0CA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765328</link>
            <guid>https://www.tenable.com/plugins/nnm/765328</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765328 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5370-1AM03-0CA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5370-1AM03-0CA0 is described as SINUMERIK 808D M PPU 141.3 horizontal with current software version, Chinese layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765328">https://www.tenable.com/plugins/nnm/765328</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5303-0AF35-3AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765327</link>
            <guid>https://www.tenable.com/plugins/nnm/765327</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765327 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5303-0AF35-3AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5303-0AF35-3AA0 is described as SINUMERIK 808D Machine control panel, vertical, English layout, Handwheel version.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765327">https://www.tenable.com/plugins/nnm/765327</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5303-0AF35-2AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765326</link>
            <guid>https://www.tenable.com/plugins/nnm/765326</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765326 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5303-0AF35-2AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5303-0AF35-2AA0 is described as SINUMERIK 808D Machine control panel, vertical, English layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765326">https://www.tenable.com/plugins/nnm/765326</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINUMERIK 808D 6FC5303-0AF35-0AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765325</link>
            <guid>https://www.tenable.com/plugins/nnm/765325</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765325 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINUMERIK 808D HMI has been detected with model number 6FC5303-0AF35-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6FC5303-0AF35-0AA0 is described as SINUMERIK 808D Machine control panel, English layout.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765325">https://www.tenable.com/plugins/nnm/765325</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF188CI 6GT2002-0JE60 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765324</link>
            <guid>https://www.tenable.com/plugins/nnm/765324</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765324 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF188CI RFID Communication Module has been detected with model number 6GT2002-0JE60.<br /></span>
      <h3>Description</h3>
      <span>The 6GT2002-0JE60 is described by Siemens as RFID communication module RF188CI for PROFINET, Ethernet, 4 readers can be connected, DI/DO interface.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765324">https://www.tenable.com/plugins/nnm/765324</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF186CI 6GT2002-0JE50 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765323</link>
            <guid>https://www.tenable.com/plugins/nnm/765323</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765323 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF186CI RFID Communication Module has been detected with model number 6GT2002-0JE50.<br /></span>
      <h3>Description</h3>
      <span>The 6GT2002-0JE50 is described by Siemens as RFID communication module RF186CI for PROFINET; Ethernet, 2 readers can be connected; DI/DO interface.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765323">https://www.tenable.com/plugins/nnm/765323</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF188C 6GT2002-0JE40 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765322</link>
            <guid>https://www.tenable.com/plugins/nnm/765322</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765322 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF188C RFID Communication Module has been detected with model number 6GT2002-0JE40.<br /></span>
      <h3>Description</h3>
      <span>The 6GT2002-0JE40 is described by Siemens as RFID Communication Module RF188C for Profinet, Ethernet, 4 Readers can be connected.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765322">https://www.tenable.com/plugins/nnm/765322</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF186C 6GT2002-0JE20 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765321</link>
            <guid>https://www.tenable.com/plugins/nnm/765321</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765321 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF186C RFID Communication Module has been detected with model number 6GT2002-0JE20.<br /></span>
      <h3>Description</h3>
      <span>The 6GT2002-0JE20 is described by Siemens as RFID Communication Module RF186C for Profinet, Ethernet, 2 Readers can be connected.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765321">https://www.tenable.com/plugins/nnm/765321</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF185C 6GT2002-0JE10 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765320</link>
            <guid>https://www.tenable.com/plugins/nnm/765320</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765320 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF185C RFID Communication Module has been detected with model number 6GT2002-0JE10.<br /></span>
      <h3>Description</h3>
      <span>The 6GT2002-0JE10 is described by Siemens as RFID Communication Module RF185C for Profinet, Ethernet, 1 Reader can be connected.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765320">https://www.tenable.com/plugins/nnm/765320</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC ITC 2200 6AV6646-1BA22-1AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765319</link>
            <guid>https://www.tenable.com/plugins/nnm/765319</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765319 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC ITC 2200 HMI has been detected with model number 6AV6646-1BA22-1AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6AV6646-1BA22-1AA0 is described as SIMATIC ITC2200 V3, Industrial Thin Client, 22" widescreen TFT display, capacitive touch sensor, Supported protocols: RDP, VNC, Smart Server, HTML5, etc., standard design, Built-in unit.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765319">https://www.tenable.com/plugins/nnm/765319</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC ITC 1900 6AV6646-1BA18-0AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765318</link>
            <guid>https://www.tenable.com/plugins/nnm/765318</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765318 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC ITC 1900 HMI has been detected with model number 6AV6646-1BA18-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6AV6646-1BA18-0AA0 is described as SIMATIC ITC1900 V3, Industrial Thin Client, 19" widescreen TFT display, capacitive touch sensor, Supported protocols: RDP, VNC, SMARTSERVER HTML5 et. al., Standard Design, panel mount.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765318">https://www.tenable.com/plugins/nnm/765318</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC ITC 1500 6AV6646-1BA15-0AA0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765317</link>
            <guid>https://www.tenable.com/plugins/nnm/765317</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765317 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC ITC 1500 HMI has been detected with model number 6AV6646-1BA15-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6AV6646-1BA15-0AA0 is described as SIMATIC ITC1500 V3, Industrial Thin Client, 15" widescreen TFT display, capacitive touch sensor, Supported protocols: RDP, VNC, SMARTSERVER HTML5 et. al., Standard Design, panel mount.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765317">https://www.tenable.com/plugins/nnm/765317</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC ITC 2200 6AV6646-1AD22-0AX0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765316</link>
            <guid>https://www.tenable.com/plugins/nnm/765316</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765316 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC ITC 2200 HMI has been detected with model number 6AV6646-1AD22-0AX0.<br /></span>
      <h3>Description</h3>
      <span>The 6AV6646-1AD22-0AX0 is described as SIMATIC ITC 2200, Industrial Thin Client, 22" widescreen TFT display, Touch operation, Supported protocols: RDP, VNC, SMARTSERVER, Web.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765316">https://www.tenable.com/plugins/nnm/765316</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC ITC 1900 6AV6646-1AC22-0AX0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765315</link>
            <guid>https://www.tenable.com/plugins/nnm/765315</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765315 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC ITC 1900 HMI has been detected with model number 6AV6646-1AC22-0AX0.<br /></span>
      <h3>Description</h3>
      <span>The 6AV6646-1AC22-0AX0 is described as SIMATIC ITC 1500, Industrial Thin Client, 15" widescreen TFT display, Touch operation, Supported protocols: RDP, VNC, SMARTSERVER, Web.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765315">https://www.tenable.com/plugins/nnm/765315</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC ITC 1500 6AV6646-1AB22-0AX0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765314</link>
            <guid>https://www.tenable.com/plugins/nnm/765314</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765314 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC ITC 1500 HMI has been detected with model number 6AV6646-1AB22-0AX0.<br /></span>
      <h3>Description</h3>
      <span>The 6AV6646-1AB22-0AX0 is described as SIMATIC ITC 1500, Industrial Thin Client, 15" widescreen TFT display, Touch operation, Supported protocols: RDP, VNC, SMARTSERVER, Web.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765314">https://www.tenable.com/plugins/nnm/765314</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC ITC 1200 6AV6646-1AA22-0AX0 HMI Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765313</link>
            <guid>https://www.tenable.com/plugins/nnm/765313</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765313 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC ITC 1200 HMI has been detected with model number 6AV6646-1AA22-0AX0.<br /></span>
      <h3>Description</h3>
      <span>The 6AV6646-1AA22-0AX0 is described as SIMATIC ITC 1200, Industrial Thin Client, 12" Widescreen TFT display, Touch operation, Supported protocols: RDP, VNC, SMARTSERVER, Web.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765313">https://www.tenable.com/plugins/nnm/765313</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE WLC712 6GK5712-0XC00-1AA0 IWLAN Controller Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765312</link>
            <guid>https://www.tenable.com/plugins/nnm/765312</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765312 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE WLC712 IWLAN Controller has been detected with model number 6GK5712-0XC00-1AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5712-0XC00-1AA0 is described by Siemens as IWLAN controller, SCALANCE WLC712, for 16 access points, expandable to 48 access points Redundant up to 96, Layer 3 roaming; VoIP support, load distribution, internal captive portal, for operation outside of North America and Japan.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765312">https://www.tenable.com/plugins/nnm/765312</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE WLC711 6GK571-10XC00-1AB0 IWLAN Controller Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765311</link>
            <guid>https://www.tenable.com/plugins/nnm/765311</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765311 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE WLC711 IWLAN Controller has been detected with model number 6GK57110XC001AB0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK571-10XC00-1AB0 is Siemens SCALANCE WLC711 IWLAN controller that complies with the IEEE 802.11n industrial wireless local area network (IWLAN) standard. The new controller is centrally configured and monitors up to 32 access points and client modules, significantly reducing commissioning time and costs, especially with large IWLAN installations.  Parallel operation of two controllers increases the availability of the communication network. The device does not require a fan and may be DIN rail mounted.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765311">https://www.tenable.com/plugins/nnm/765311</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE  W1788-2IA M12 6GK5788-2HY01-0AA0 Access Point Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765310</link>
            <guid>https://www.tenable.com/plugins/nnm/765310</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765310 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE  W1788-2IA M12 Access Point has been detected with model number 6GK5788-2HY01-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5788-2HY01-0AA0 Access Point is described by Siemens as IWLAN access point, SCALANCE W1788-2IA M12, 2 radios, 8 internal antennas, iFeatures support via CLP, IEEE 802.11a/b/g/h/n/ac, 2.4/5 GHz, gross 1733 Mbit/s per radio, 2x M12 max. 1 Gbit/s, PoE, redundant 24 V DC, M12 A-coded IP65, CLP slot, WPA2/802.11i/e.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765310">https://www.tenable.com/plugins/nnm/765310</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE W1788-2 M12 EEC 6GK5788-2GY01-0TA0 Access Point Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765309</link>
            <guid>https://www.tenable.com/plugins/nnm/765309</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765309 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE W1788-2 M12 EEC Access Point has been detected with model number 6GK5788-2GY01-0TA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5788-2GY01-0TA0 Access Point is described by Siemens as IWLAN access point, SCALANCE W1788-2 M12 EEC, 2 radios, 8 N-CON antennas iFeatures support via CLP, IEEE 802.11 a/b/g/h/n/ac, 2.4/5 GHz, gross 1733 Mbit/s per radio, 2x M12 max. 1 Gbit/s, PoE, redundant 24 V DC,M12 A-coded IP65, CLP slot, WPA2/802.11i/e.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765309">https://www.tenable.com/plugins/nnm/765309</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE W1788-2 M12 6GK5788-2GY01-0AA0 Access Point Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765308</link>
            <guid>https://www.tenable.com/plugins/nnm/765308</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765308 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE W1788-2 M12 Access Point has been detected with model number 6GK5788-2GY01-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5788-2GY01-0AA0 Access Point is described by Siemens as IWLAN access point, SCALANCE W1788-2 M12, 2 radios, 8 N-CON antenna port, iFeatures support via CLP, IEEE 802.11a/b/g/h/n/ac, 2.4/5 GHz, gross 1733 Mbit/s per radio, 2x M12 max. 1 Gbit/s, PoE, redundant 24 V DC,M12 A-coded IP65, CLP slot, WPA2/802.11i/e.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765308">https://www.tenable.com/plugins/nnm/765308</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE W1788-1 M12 6GK5788-1GY01-0AA0 Access Point Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765307</link>
            <guid>https://www.tenable.com/plugins/nnm/765307</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765307 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE W1788-1 M12 Access Point has been detected with model number 6GK5788-1GY01-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5788-1GY01-0AA0 Access Point is described by Siemens as IWLAN access point, SCALANCE W1788-1 M12, 1 radio, 4 N-CON antenna port, iFeatures support via CLP, IEEE 802.11a/b/g/h/n/ac, 2.4/5 GHz, gross 1733 Mbit/s per radio, 2x M12 max. 1 Gbit/s, PoE, redundant 24 V DC,M12 A-coded IP65, CLP slot, WPA2/802.11i/e.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765307">https://www.tenable.com/plugins/nnm/765307</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens RUGGEDCOM RM1224-NAM 6GK6108-4AM00-2DA2 4G Router Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765306</link>
            <guid>https://www.tenable.com/plugins/nnm/765306</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765306 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A SSiemens RUGGEDCOM RM1224-NAM 4G Router has been detected with model number 6GK6108-4AM00-2DA2.<br /></span>
      <h3>Description</h3>
      <span>The 6GK6108-4AM00-2DA2 Router is described by Siemens as RUGGEDCOM RM1224-NAM 4G ROUTER For wireless IP-communication from Ethernet based devices via LTE(4G)- mobile radio, optimized for use in North America, VPN, firewall, NAT 4-port switch 2x SMA antenna Connectors, MIMO technology 1xdig. input.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765306">https://www.tenable.com/plugins/nnm/765306</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens RUGGEDCOM RM1224-EU 6GK6108-4AM00-2BA2 4G Router Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765305</link>
            <guid>https://www.tenable.com/plugins/nnm/765305</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765305 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A SSiemens RUGGEDCOM RM1224-EU 4G Router has been detected with model number 6GK6108-4AM00-2BA2.<br /></span>
      <h3>Description</h3>
      <span>The 6GK6108-4AM00-2BA2 Router is described by Siemens as RUGGEDCOM RM1224-EU 4G ROUTER For wireless IP-communication from Ethernet based devices via LTE(4G)- mobile radio, optimized for use in Europe, VPN, firewall, NAT 4-port switch 2x SMA antenna Connectors, MIMO technology 1xdig. input, 1xdig. output.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765305">https://www.tenable.com/plugins/nnm/765305</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens CP 1243-8 IRC Communications Processor Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765304</link>
            <guid>https://www.tenable.com/plugins/nnm/765304</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765304 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens CP 1243-8 IRC Communications processor has been detected with model number 6GK7243-8RX30-0XE0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK7243-8RX30-0XE0 Communications processor is described by Siemens as Communications processor CP 1243-8 IRC for operating a SIMATIC S7-1200 in the TeleControl system Professional; for SINAUT ST7; DNP3; IEC60870-5, Station type: RTU; WAN connections: 1) Ethernet 2) Additionally expandable with TS module RS232 or TS module modem or TS module GSM or TS module ISDN; Operation with TIM modules possible.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765304">https://www.tenable.com/plugins/nnm/765304</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens CP 1243-7 LTE Communications Processor Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765303</link>
            <guid>https://www.tenable.com/plugins/nnm/765303</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765303 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens CP 1243-7 LTE Communications processor has been detected with model number 6GK7243-7SX30-0XE0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK7243-7SX30-0XE0 Communications processor is described by Siemens as Communications processor CP 1243-7 LTE US for Connection of SIMATIC S7-1200 to LTE network in American frequency band.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765303">https://www.tenable.com/plugins/nnm/765303</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens CP 1243-7 LTE Communications Processor Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765302</link>
            <guid>https://www.tenable.com/plugins/nnm/765302</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765302 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens CP 1243-7 LTE Communications processor has been detected with model number 6GK7243-7KX30-0XE0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK7243-7KX30-0XE0 Communications processor is described by Siemens as Communications processor CP 1243-7 LTE EU for Connection of SIMATIC S7-1200 to LTE network in European Frequency range.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765302">https://www.tenable.com/plugins/nnm/765302</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC WinAC RTX 2010 Uncontrolled Resource Consumption (ICSA-19-281-03)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720315</link>
            <guid>https://www.tenable.com/plugins/nnm/720315</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720315 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Uncontrolled Resource Consumption (CWE-400) vulnerability has been identified in Siemens SIMATIC WinAC RTX 2010.<br /></span>
      <h3>Description</h3>
      <span>An unauthenticated attacker sending a large HTTP request to the host where WinAC RTX is running may trigger a denial-of-service condition.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720315">https://www.tenable.com/plugins/nnm/720315</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Industrial Real-Time (IRT) Devices Improper Input Validation (ICSA-19-283-01)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720314</link>
            <guid>https://www.tenable.com/plugins/nnm/720314</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720314 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Improper Input Validation vulnerability has been identified in Siemens SIMATIC ET, S7, SINUMERIK, SINAMICS Industrial Real-Time Devices.<br /></span>
      <h3>Description</h3>
      <span>An attacker sending a specially crafted packet could break the real-time synchronization of the affected installation, which may cause a denial-of-service condition.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720314">https://www.tenable.com/plugins/nnm/720314</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens PROFINET Devices Uncontrolled Resource Consumption (ICSA-19-283-02)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720313</link>
            <guid>https://www.tenable.com/plugins/nnm/720313</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720313 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Uncontrolled Resource Consumption vulnerability has been identified in Siemens SIMATIC ET, HMI, S7, SINUMERIK, SINAMICS PROFINET devices.<br /></span>
      <h3>Description</h3>
      <span>An unauthenticated attacker sending a large amount of specially crafted UDP packets may trigger a denial-of-service condition.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720313">https://www.tenable.com/plugins/nnm/720313</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Industrial Products Integer Overflow or Wraparound or Uncontrolled Resource Consumption (ICSA-19-253-03)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720312</link>
            <guid>https://www.tenable.com/plugins/nnm/720312</guid>
            <pubDate>Sun, 03 Nov 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720312 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Integer Overflow or Wraparound or Uncontrolled Resource Consumption vulnerability has been identified in Siemens CM, CP, SIMATIC, SINUMERIK, SINAMICS, SCALANCE, and TIM.<br /></span>
      <h3>Description</h3>
      <span>The kernel of the listed devices is affected by an integer overflow when handling TCP Selective Acknowledgements, which could allow a remote attacker to cause a denial-of-service condition. Also, a remote attacker sending specially crafted TCP Selective Acknowledgment (SACK) sequences may cause a denial-of-service condition. And, finally, an attacker may exploit a vulnerability in the TCP retransmission queue when handling SACK to cause a denial-of-service condition.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720312">https://www.tenable.com/plugins/nnm/720312</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HE12-0UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765299</link>
            <guid>https://www.tenable.com/plugins/nnm/765299</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765299 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HE12-0UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HE12-0UF0 Servo Drive is characterized by: Input voltage: 200-480V 3AC; 3.8 A 45-66 Hz Output voltage: 0-input V; 3.0 A; 0-550 Hz Motor: 1.0 kW; degree of protection IP20.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765299">https://www.tenable.com/plugins/nnm/765299</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HE11-5UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765298</link>
            <guid>https://www.tenable.com/plugins/nnm/765298</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765298 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HE11-5UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HE11-5UF0 Servo Drive is characterized by: Input voltage: 200-480V 3AC; 3.8 A 45-66 Hz Output voltage: 0-input V; 3.0 A; 0-550 Hz Motor: 1.0 kW; degree of protection IP20.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765298">https://www.tenable.com/plugins/nnm/765298</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HE11-0UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765297</link>
            <guid>https://www.tenable.com/plugins/nnm/765297</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765297 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HE11-0UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HE11-0UF0 Servo Drive is characterized by: Input voltage: 200-480V 3AC; 3.8 A 45-66 Hz Output voltage: 0-input V; 3.0 A; 0-550 Hz Motor: 1.0 kW; degree of protection IP20.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765297">https://www.tenable.com/plugins/nnm/765297</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HE10-8UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765296</link>
            <guid>https://www.tenable.com/plugins/nnm/765296</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765296 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HE10-8UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HE10-8UF0 Servo Drive is characterized by: Input voltage: 200-480V 3AC; 2.9A 45-66Hz Output voltage: 0-Input V 2.3A 0-550Hz Motor: 0.75kW; degree of protection IP20.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765296">https://www.tenable.com/plugins/nnm/765296</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HE10-4UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765295</link>
            <guid>https://www.tenable.com/plugins/nnm/765295</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765295 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HE10-4UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HE10-4UF0 Servo Drive is characterized by: Input voltage: 200-480V 3AC; 1.5 A; 45-66 Hz; Output voltage: 0-input V; 1.2 A; 0-550 Hz; Motor: 0.4 kW; degree of protection IP20.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765295">https://www.tenable.com/plugins/nnm/765295</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HB10-8UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765294</link>
            <guid>https://www.tenable.com/plugins/nnm/765294</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765294 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HB10-8UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HB10-8UF0 Servo Drive is characterized by: Input voltage: 200-240V 1AC; 9.3 A; 45-66 Hz; Output voltage: 0-input V; 4.4 A; 0-550 Hz; Motor: 0.75 kW; degree of protection IP20.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765294">https://www.tenable.com/plugins/nnm/765294</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HB10-4UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765293</link>
            <guid>https://www.tenable.com/plugins/nnm/765293</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765293 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HB10-4UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HB10-4UF0 Servo Drive is characterized by: Input voltage: 200-240V 1AC; 5.0A; 45-66Hz; Output voltage: 0-input V; 2.4A; 0-550Hz; Motor: 0.4 kW; degree of protection IP20.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765293">https://www.tenable.com/plugins/nnm/765293</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HB10-2UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765292</link>
            <guid>https://www.tenable.com/plugins/nnm/765292</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765292 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HB10-2UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HB10-2UF0 Servo Drive has following characteristics: Input voltage: 200-240V 1AC; 2.7A; 45-66Hz; Output voltage: 0-input V; 1.4A; 0-550Hz; Motor: 0.2 kW; degree of protection IP20.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765292">https://www.tenable.com/plugins/nnm/765292</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SINAMICS S210 6SL3210-5HB10-1UF0 Servo Drive Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765291</link>
            <guid>https://www.tenable.com/plugins/nnm/765291</guid>
            <pubDate>Tue, 29 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765291 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SINAMICS S210 Servo Drive has been detected with model number 6SL3210-5HB10-1UF0.<br /></span>
      <h3>Description</h3>
      <span>The 6SL3210-5HB10-1UF0 Servo Drive has following characteristics: Input voltage: 200-240V 1AC; 1.4A; 45-66Hz; Output voltage: 0-input V; 0.8 A 0-550Hz; Motor: 0.1 kW.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765291">https://www.tenable.com/plugins/nnm/765291</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF685R 6GT2811-6CA10-4AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765290</link>
            <guid>https://www.tenable.com/plugins/nnm/765290</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765290 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF685R RFID Reader has been detected with the model number 6GT2811-6CA10-4AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance SIMATIC RF685R reader has a built-in adaptive antenna and a connection for an external antenna. This enables single reading stations with one or two antennas or two logical reading stations to be implemented for reading on conveyor systems. Data communication in the RF685R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol via PROFINET, via EtherNet/IP or by means of OPC-UA. Two Ethernet interfaces are available for data and diagnostics.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765290">https://www.tenable.com/plugins/nnm/765290</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF685R 6GT2811-6CA10-2AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765289</link>
            <guid>https://www.tenable.com/plugins/nnm/765289</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765289 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF685R RFID Reader has been detected with the model number 6GT2811-6CA10-2AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance SIMATIC RF685R reader has a built-in adaptive antenna and a connection for an external antenna. This enables single reading stations with one or two antennas or two logical reading stations to be implemented for reading on conveyor systems. Data communication in the RF685R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol via PROFINET, via EtherNet/IP or by means of OPC-UA. Two Ethernet interfaces are available for data and diagnostics.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765289">https://www.tenable.com/plugins/nnm/765289</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF685R 6GT2811-6CA10-1AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765288</link>
            <guid>https://www.tenable.com/plugins/nnm/765288</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765288 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF685R RFID Reader has been detected with the model number 6GT2811-6CA10-1AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance SIMATIC RF685R reader has a built-in adaptive antenna and a connection for an external antenna. This enables single reading stations with one or two antennas or two logical reading stations to be implemented for reading on conveyor systems. Data communication in the RF685R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol via PROFINET, via EtherNet/IP or by means of OPC-UA. Two Ethernet interfaces are available for data and diagnostics.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765288">https://www.tenable.com/plugins/nnm/765288</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF685R 6GT2811-6CA10-0AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765287</link>
            <guid>https://www.tenable.com/plugins/nnm/765287</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765287 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF685R RFID Reader has been detected with the model number 6GT2811-6CA10-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance SIMATIC RF685R reader has a built-in adaptive antenna and a connection for an external antenna. This enables single reading stations with one or two antennas or two logical reading stations to be implemented for reading on conveyor systems. Data communication in the RF685R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol via PROFINET, via EtherNet/IP or by means of OPC-UA. Two Ethernet interfaces are available for data and diagnostics.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765287">https://www.tenable.com/plugins/nnm/765287</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF680R 6GT2811-6AA10-4AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765286</link>
            <guid>https://www.tenable.com/plugins/nnm/765286</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765286 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF680R RFID Reader has been detected with the model number 6GT2811-6AA10-4AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance SIMATIC RF680R reader has four antenna connections that can be configured as required for individual read stations, or as gates. Data communication in the RF680R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol via PROFINET, via EtherNet/IP or by means of OPC UA. The reader can be operated with PROFIBUS via the communication module ASM 456. Two Ethernet interfaces are available for data and diagnostics, one of which has PROFINET capability.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765286">https://www.tenable.com/plugins/nnm/765286</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF680R 6GT2811-6AA10-2AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765285</link>
            <guid>https://www.tenable.com/plugins/nnm/765285</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765285 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF680R RFID Reader has been detected with the model number 6GT2811-6AA10-2AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance SIMATIC RF680R reader has four antenna connections that can be configured as required for individual read stations, or as gates. Data communication in the RF680R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol via PROFINET, via EtherNet/IP or by means of OPC UA. The reader can be operated with PROFIBUS via the communication module ASM 456. Two Ethernet interfaces are available for data and diagnostics, one of which has PROFINET capability.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765285">https://www.tenable.com/plugins/nnm/765285</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF680R 6GT2811-6AA10-1AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765284</link>
            <guid>https://www.tenable.com/plugins/nnm/765284</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765284 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF680R RFID Reader has been detected with the model number 6GT2811-6AA10-1AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance SIMATIC RF680R reader has four antenna connections that can be configured as required for individual read stations, or as gates. Data communication in the RF680R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol via PROFINET, via EtherNet/IP or by means of OPC UA. The reader can be operated with PROFIBUS via the communication module ASM 456. Two Ethernet interfaces are available for data and diagnostics, one of which has PROFINET capability.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765284">https://www.tenable.com/plugins/nnm/765284</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF680R 6GT2811-6AA10-0AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765283</link>
            <guid>https://www.tenable.com/plugins/nnm/765283</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765283 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF680R RFID Reader has been detected with the model number 6GT2811-6AA10-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance SIMATIC RF680R reader has four antenna connections that can be configured as required for individual read stations, or as gates. Data communication in the RF680R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol via PROFINET, via EtherNet/IP or by means of OPC UA. The reader can be operated with PROFIBUS via the communication module ASM 456. Two Ethernet interfaces are available for data and diagnostics, one of which has PROFINET capability.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765283">https://www.tenable.com/plugins/nnm/765283</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF650R 6GT2811-6AB20-4AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765282</link>
            <guid>https://www.tenable.com/plugins/nnm/765282</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765282 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF650R RFID Reader has been detected with the model number 6GT2811-6AB20-4AA0.<br /></span>
      <h3>Description</h3>
      <span>The stationary SIMATIC RF650R reader with its integral antenna is ideal for typical gate applications in logistics, distribution, supply chain management and asset management. Data communication in the SIMATIC RF650R is executed either via an XML protocol with TCP/IP or via OPC-UA. The digital inputs and outputs (DI/DO) are used for simple process interfacing (sensors, actuators).<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765282">https://www.tenable.com/plugins/nnm/765282</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF650R 6GT2811-6AB20-2AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765281</link>
            <guid>https://www.tenable.com/plugins/nnm/765281</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765281 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF650R RFID Reader has been detected with the model number 6GT2811-6AB20-2AA0.<br /></span>
      <h3>Description</h3>
      <span>The stationary SIMATIC RF650R reader with its integral antenna is ideal for typical gate applications in logistics, distribution, supply chain management and asset management. Data communication in the SIMATIC RF650R is executed either via an XML protocol with TCP/IP or via OPC-UA. The digital inputs and outputs (DI/DO) are used for simple process interfacing (sensors, actuators).<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765281">https://www.tenable.com/plugins/nnm/765281</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF650R 6GT2811-6AB20-1AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765280</link>
            <guid>https://www.tenable.com/plugins/nnm/765280</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765280 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF650R RFID Reader has been detected with the model number 6GT2811-6AB20-1AA0.<br /></span>
      <h3>Description</h3>
      <span>The stationary SIMATIC RF650R reader with its integral antenna is ideal for typical gate applications in logistics, distribution, supply chain management and asset management. Data communication in the SIMATIC RF650R is executed either via an XML protocol with TCP/IP or via OPC-UA. The digital inputs and outputs (DI/DO) are used for simple process interfacing (sensors, actuators).<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765280">https://www.tenable.com/plugins/nnm/765280</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF650R 6GT2811-6AB20-0AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765279</link>
            <guid>https://www.tenable.com/plugins/nnm/765279</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765279 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF650R RFID Reader has been detected with the model number 6GT2811-6AB20-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The stationary SIMATIC RF650R reader with its integral antenna is ideal for typical gate applications in logistics, distribution, supply chain management and asset management. Data communication in the SIMATIC RF650R is executed either via an XML protocol with TCP/IP or via OPC-UA. The digital inputs and outputs (DI/DO) are used for simple process interfacing (sensors, actuators).<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765279">https://www.tenable.com/plugins/nnm/765279</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF615R 6GT2811-6CC10-2AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765278</link>
            <guid>https://www.tenable.com/plugins/nnm/765278</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765278 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF615R RFID Reader has been detected with the model number 6GT2811-6CC10-2AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance, compact SIMATIC RF615R reader has a built-in, circularly polarized antenna and an external antenna connection. This enables single reading stations with one or two antennas or two logical reading stations to be implemented for measuring in conveyor technology applications.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765278">https://www.tenable.com/plugins/nnm/765278</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF615R 6GT2811-6CC10-1AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765277</link>
            <guid>https://www.tenable.com/plugins/nnm/765277</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765277 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF615R RFID Reader has been detected with the model number 6GT2811-6CC10-1AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance, compact SIMATIC RF615R reader has a built-in, circularly polarized antenna and an external antenna connection. This enables single reading stations with one or two antennas or two logical reading stations to be implemented for measuring in conveyor technology applications.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765277">https://www.tenable.com/plugins/nnm/765277</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF615R 6GT2811-6CC10-0AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765276</link>
            <guid>https://www.tenable.com/plugins/nnm/765276</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765276 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF615R RFID Reader has been detected with the model number 6GT2811-6CC10-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The high-performance, compact SIMATIC RF615R reader has a built-in, circularly polarized antenna and an external antenna connection. This enables single reading stations with one or two antennas or two logical reading stations to be implemented for measuring in conveyor technology applications.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765276">https://www.tenable.com/plugins/nnm/765276</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF610R 6GT2811-6BC10-2AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765275</link>
            <guid>https://www.tenable.com/plugins/nnm/765275</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765275 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF610R RFID Reader has been detected with the model number 6GT2811-6BC10-2AA0.<br /></span>
      <h3>Description</h3>
      <span>The stationary SIMATIC RF610R compact reader is ideally suited for applications along conveyor belts, in mechanical and plant engineering, and for read points that can be implemented with one antenna. Data communication in the SIMATIC RF610R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol and PROFINET, via EtherNet/IP or by means of OPC UA. An Ethernet interface with PROFINET capability is available for data and diagnostics.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765275">https://www.tenable.com/plugins/nnm/765275</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF610R 6GT2811-6BC10-1AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765274</link>
            <guid>https://www.tenable.com/plugins/nnm/765274</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765274 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF610R RFID Reader has been detected with the model number 6GT2811-6BC10-1AA0.<br /></span>
      <h3>Description</h3>
      <span>The stationary SIMATIC RF610R compact reader is ideally suited for applications along conveyor belts, in mechanical and plant engineering, and for read points that can be implemented with one antenna. Data communication in the SIMATIC RF610R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol and PROFINET, via EtherNet/IP or by means of OPC UA. An Ethernet interface with PROFINET capability is available for data and diagnostics.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765274">https://www.tenable.com/plugins/nnm/765274</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF610R 6GT2811-6BC10-0AA0 RFID Reader Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765273</link>
            <guid>https://www.tenable.com/plugins/nnm/765273</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765273 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF610R RFID Reader has been detected with the model number 6GT2811-6BC10-0AA0.<br /></span>
      <h3>Description</h3>
      <span>The stationary SIMATIC RF610R compact reader is ideally suited for applications along conveyor belts, in mechanical and plant engineering, and for read points that can be implemented with one antenna. Data communication in the SIMATIC RF610R is executed either via an XML protocol with TCP/IP, by means of an S7 protocol and PROFINET, via EtherNet/IP or by means of OPC UA. An Ethernet interface with PROFINET capability is available for data and diagnostics.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765273">https://www.tenable.com/plugins/nnm/765273</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF181EIP 6GT2002-0JD20 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765272</link>
            <guid>https://www.tenable.com/plugins/nnm/765272</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765272 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF181EIP RFID Communication Module has been detected with the model number 6GT2002-0JD20.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIMATIC RF181EIP allow two RFID readers to be connected and operated via Ethernet/IP. The web-based management and the engineering in the TIA (Totally Integrated Automation) Portal, enable secured access to configuration, commissioning and diagnostic tools. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765272">https://www.tenable.com/plugins/nnm/765272</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF182C 6GT2002-0JD10 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765271</link>
            <guid>https://www.tenable.com/plugins/nnm/765271</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765271 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF182C RFID Communication Module has been detected with the model number 6GT2002-0JD10.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIMATIC RF182C allow two RFID readers to be connected and operated via Ethernet TCP/IP. The web-based management and the engineering in the TIA (Totally Integrated Automation) Portal, enable secured access to configuration, commissioning and diagnostic tools. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765271">https://www.tenable.com/plugins/nnm/765271</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF180C 6GT2002-0JD00 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765270</link>
            <guid>https://www.tenable.com/plugins/nnm/765270</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765270 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF180C RFID Communication Module has been detected with the model number 6GT2002-0JD00.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIMATIC RF180C allow two RFID readers to be connected and operated via Profinet. The web-based management and the engineering in the TIA (Totally Integrated Automation) Portal, enable secured access to configuration, commissioning and diagnostic tools. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765270">https://www.tenable.com/plugins/nnm/765270</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF188CI 6GT2002-0JE40 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765269</link>
            <guid>https://www.tenable.com/plugins/nnm/765269</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765269 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF188CI RFID Communication Module has been detected with the model number 6GT2002-0JE40.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIMATIC RF188CI allow four RFID readers to be connected and operated via Ethernet/Profinet. The web-based management and the engineering in the TIA (Totally Integrated Automation) Portal, enable secured access to configuration, commissioning and diagnostic tools. It supports OPC UA as an IoT (Internet of Things) interface, and communicate via the OPC UA AutoID Companion Specification V1.0 data model.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765269">https://www.tenable.com/plugins/nnm/765269</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF186CI 6GT2002-0JE50 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765268</link>
            <guid>https://www.tenable.com/plugins/nnm/765268</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765268 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF186CI RFID Communication Module has been detected with the model number 6GT2002-0JE50.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIMATIC RF186CI allow two RFID readers to be connected and operated via Ethernet/Profinet. The web-based management and the engineering in the TIA (Totally Integrated Automation) Portal, enable secured access to configuration, commissioning and diagnostic tools. It supports OPC UA as an IoT (Internet of Things) interface, and communicate via the OPC UA AutoID Companion Specification V1.0 data model.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765268">https://www.tenable.com/plugins/nnm/765268</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF188C 6GT2002-0JE40 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765267</link>
            <guid>https://www.tenable.com/plugins/nnm/765267</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765267 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF188C RFID Communication Module has been detected with the model number 6GT2002-0JE40.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIMATIC RF188C allow four RFID readers to be connected and operated via Ethernet/Profinet. The web-based management and the engineering in the TIA (Totally Integrated Automation) Portal, enable secured access to configuration, commissioning and diagnostic tools. It supports OPC UA as an IoT (Internet of Things) interface, and communicate via the OPC UA AutoID Companion Specification V1.0 data model.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765267">https://www.tenable.com/plugins/nnm/765267</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF186C 6GT2002-0JE20 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765266</link>
            <guid>https://www.tenable.com/plugins/nnm/765266</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765266 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF186C RFID Communication Module has been detected with the model number 6GT2002-0JE20.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIMATIC RF186C allow two RFID readers to be connected and operated via Ethernet/Profinet. The web-based management and the engineering in the TIA (Totally Integrated Automation) Portal, enable secured access to configuration, commissioning and diagnostic tools. It supports OPC UA as an IoT (Internet of Things) interface, and communicate via the OPC UA AutoID Companion Specification V1.0 data model.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765266">https://www.tenable.com/plugins/nnm/765266</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF185C 6GT2002-0JE10 RFID Communication Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765265</link>
            <guid>https://www.tenable.com/plugins/nnm/765265</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765265 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIMATIC RF185C RFID Communication Module has been detected with the model number 6GT2002-0JE10.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIMATIC RF185C allow one RFID reader to be connected and operated via Ethernet/Profinet. The web-based management and the engineering in the TIA (Totally Integrated Automation) Portal, enable secured access to configuration, commissioning and diagnostic tools. It supports OPC UA as an IoT (Internet of Things) interface, and communicate via the OPC UA AutoID Companion Specification V1.0 data model.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765265">https://www.tenable.com/plugins/nnm/765265</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7VK87 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765264</link>
            <guid>https://www.tenable.com/plugins/nnm/765264</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765264 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7VK87.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7VK87 provides following functionality: Protection functions for 3-pole tripping; Protection functions for 1-pole tripping; Overexcitation protection; Synchrocheck, synchronizing function.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765264">https://www.tenable.com/plugins/nnm/765264</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7UT87 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765263</link>
            <guid>https://www.tenable.com/plugins/nnm/765263</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765263 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7UT87.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7UT87 provides following functionality: Distance protection; Impedance protection for transformers; Line differential protection for 2 line ends; Overexcitation protection; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765263">https://www.tenable.com/plugins/nnm/765263</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7UT86 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765262</link>
            <guid>https://www.tenable.com/plugins/nnm/765262</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765262 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7UT86.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7UT86 provides following functionality: Distance protection; Impedance protection for transformers; Line differential protection for 2 line ends; Overexcitation protection; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765262">https://www.tenable.com/plugins/nnm/765262</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7UT85 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765261</link>
            <guid>https://www.tenable.com/plugins/nnm/765261</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765261 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7UT85.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7UT85 provides following functionality: Distance protection; Impedance protection for transformers; Line differential protection for 2 line ends; Overexcitation protection; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765261">https://www.tenable.com/plugins/nnm/765261</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7UT82 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765260</link>
            <guid>https://www.tenable.com/plugins/nnm/765260</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765260 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7UT82.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7UT82 provides following functionality: Undercurrent; Temperature Supervision; Negative sequence overcurrent protection; Unbalanced-load protection (thermal).<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765260">https://www.tenable.com/plugins/nnm/765260</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7UM85 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765259</link>
            <guid>https://www.tenable.com/plugins/nnm/765259</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765259 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7UM85.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7UM85 provides following functionality: Impedance protection for transformers; Overexcitation protection; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage protection: 3-phase or universal Vx; Undervoltage-controlled reactive power protection.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765259">https://www.tenable.com/plugins/nnm/765259</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SS85 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765258</link>
            <guid>https://www.tenable.com/plugins/nnm/765258</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765258 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SS85.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SS85 provides following functionality: Protection for 3-pole tripping; Protection functions for 1-pole tripping; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Temperature Supervision. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765258">https://www.tenable.com/plugins/nnm/765258</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SL87 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765257</link>
            <guid>https://www.tenable.com/plugins/nnm/765257</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765257 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SL87.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SL87 provides following functionality: Protection for 3-pole tripping; Protection functions for 1-pole tripping; Distance protection; Impedance protection for transformers; Line differential protection for 2 line ends; Line differential protection for 3 to 6 line ends (dependent on Significant properties); Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765257">https://www.tenable.com/plugins/nnm/765257</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SL86 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765256</link>
            <guid>https://www.tenable.com/plugins/nnm/765256</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765256 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SL86.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SL86 provides following functionality: Protection for 3-pole tripping; Distance protection; Impedance protection for transformers; Line differential protection for 2 line ends; Line differential protection for 3 to 6 line ends (dependent on Significant properties); Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765256">https://www.tenable.com/plugins/nnm/765256</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SL82 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765255</link>
            <guid>https://www.tenable.com/plugins/nnm/765255</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765255 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SL82.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SL82 provides following functionality: Protection for 3-pole tripping; Distance protection; Impedance protection for transformers; Line differential protection for 2 line ends; Line differential protection for 3 to 6 line ends (dependent on Significant properties); Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power. <br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765255">https://www.tenable.com/plugins/nnm/765255</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SK85 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765254</link>
            <guid>https://www.tenable.com/plugins/nnm/765254</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765254 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SK85.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SK85 provides following functionality: Protection for 3-pole tripping; Locked rotor protection; Overexcitation protection; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765254">https://www.tenable.com/plugins/nnm/765254</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SK82 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765253</link>
            <guid>https://www.tenable.com/plugins/nnm/765253</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765253 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SK82.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SK82 provides following functionality: Protection for 3-pole tripping; Locked rotor protection; Overexcitation protection; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765253">https://www.tenable.com/plugins/nnm/765253</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SJ86 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765252</link>
            <guid>https://www.tenable.com/plugins/nnm/765252</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765252 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SJ86.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SJ86 provides following functionality: Protection for 3-pole tripping; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765252">https://www.tenable.com/plugins/nnm/765252</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SJ85 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765251</link>
            <guid>https://www.tenable.com/plugins/nnm/765251</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765251 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SJ85.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SJ85 provides following functionality: Protection for 3-pole tripping; Overexcitation protection; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765251">https://www.tenable.com/plugins/nnm/765251</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SJ82 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765250</link>
            <guid>https://www.tenable.com/plugins/nnm/765250</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765250 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SJ82.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SJ82 provides following functionality: Protection for 3-pole tripping; Overexcitation protection; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765250">https://www.tenable.com/plugins/nnm/765250</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SD87 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765249</link>
            <guid>https://www.tenable.com/plugins/nnm/765249</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765249 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SD87.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SD87 provides following functionality: Protection for 3-pole tripping; Line differential protection for 2 line ends; Line differential protection for 3 to 6 line ends (dependent on Significant properties); Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765249">https://www.tenable.com/plugins/nnm/765249</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SD86 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765248</link>
            <guid>https://www.tenable.com/plugins/nnm/765248</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765248 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SD86.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SD86 provides following functionality: Protection for 3-pole tripping; Line differential protection for 2 line ends; Line differential protection for 3 to 6 line ends (dependent on Significant properties); Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765248">https://www.tenable.com/plugins/nnm/765248</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SD82 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765247</link>
            <guid>https://www.tenable.com/plugins/nnm/765247</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765247 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SD82.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SD82 provides following functionality: Protection for 3-pole tripping; Line differential protection for 2 line ends; Line differential protection for 3 to 6 line ends (dependent on Significant properties); Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765247">https://www.tenable.com/plugins/nnm/765247</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SA87 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765246</link>
            <guid>https://www.tenable.com/plugins/nnm/765246</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765246 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SA87.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SA87 provides following functionality: Protection for 3-pole tripping; Distance protection; Impedance protection for transformers; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision; Negative sequence overcurrent protection with direction; Overvoltage protection, negative-sequence system; Thermal overload protection; Overcurrent protection; High speed instantaneous overcurrent protection; Instantaneous tripping at switch onto fault.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765246">https://www.tenable.com/plugins/nnm/765246</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SA86 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765245</link>
            <guid>https://www.tenable.com/plugins/nnm/765245</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765245 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SA86.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SA86 provides following functionality: Protection for 3-pole tripping; Distance protection; Impedance protection for transformers; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision; Negative sequence overcurrent protection with direction; Overvoltage protection, negative-sequence system; Thermal overload protection; Overcurrent protection; High speed instantaneous overcurrent protection; Instantaneous tripping at switch onto fault.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765245">https://www.tenable.com/plugins/nnm/765245</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7SA82 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765244</link>
            <guid>https://www.tenable.com/plugins/nnm/765244</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765244 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7SA82.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7SA82 provides following functionality: Protection for 3-pole tripping; Distance protection; Impedance protection for transformers; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or pos.seq.V1 or universal Vx; Undervoltage-controlled reactive power protection; Power protection active/reactive power; Undercurrent; Temperature Supervision; Negative sequence overcurrent protection with direction; Overvoltage protection, negative-sequence system; Thermal overload protection; Overcurrent protection; High speed instantaneous overcurrent protection; Instantaneous tripping at switch onto fault.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765244">https://www.tenable.com/plugins/nnm/765244</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 7KE85 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765243</link>
            <guid>https://www.tenable.com/plugins/nnm/765243</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765243 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 7KE85.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 7KE85 is hardware quantity structure expandable.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765243">https://www.tenable.com/plugins/nnm/765243</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 6MD86 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765242</link>
            <guid>https://www.tenable.com/plugins/nnm/765242</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765242 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 6MD86.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 6MD86 provides following functionality: Protection for 3-pole tripping; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or universal Vx; Power protection active/reactive power; Temperature Supervision; Negative sequence overcurrent protection; Thermal overload protection; Overcurrent protection; High speed instantaneous overcurrent protection; Instantaneous tripping at switch onto fault.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765242">https://www.tenable.com/plugins/nnm/765242</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 6MD85 Power Systems Monitoring and Protection Device]]></title>
            <link>https://www.tenable.com/plugins/nnm/765241</link>
            <guid>https://www.tenable.com/plugins/nnm/765241</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765241 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SIPROTEC 5 Power Systems Monitoring and Protection Device has been detected with the model number 6MD85.<br /></span>
      <h3>Description</h3>
      <span>The Siemens SIPROTEC 5 6MD85 provides following functionality: Protection for 3-pole tripping; Synchrocheck, synchronizing function; Undervoltage protection: 3-phase or universal Vx; Power protection active/reactive power; Temperature Supervision; Negative sequence overcurrent protection; Thermal overload protection; Overcurrent protection; High speed instantaneous overcurrent protection; Instantaneous tripping at switch onto fault.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765241">https://www.tenable.com/plugins/nnm/765241</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens CP, SIMATIC, SIMOCODE, SINAMICS, SITOP, and TIM Out-of-bounds Read (ICSA-19-099-06)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720311</link>
            <guid>https://www.tenable.com/plugins/nnm/720311</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720311 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Out-of-bounds Read vulnerability has been identified in Siemens CP, SIMATIC, SIMOCODE, SINAMICS, SITOP, and TIM.<br /></span>
      <h3>Description</h3>
      <span>The webserver of the affected devices contains a vulnerability that may allow an attacker to cause a denial-of-service condition, which leads to a restart of the webserver.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720311">https://www.tenable.com/plugins/nnm/720311</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIPROTEC 5 < V7.9 and DIGSI 5 < V7.9 Improper Input Validation (ICSA-19-190-05)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720310</link>
            <guid>https://www.tenable.com/plugins/nnm/720310</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720310 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Improper Input Validation vulnerability has been identified in SIPROTEC 5 &lt; V7.9 and DIGSI 5 &lt; V7.9.<br /></span>
      <h3>Description</h3>
      <span>A remote attacker could use specially crafted packets sent to Port 443/TCP to upload, download, or delete files in certain parts of the file system. Other specially crafted packets sent to Port 443/TCP could cause a denial-of-service condition.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720310">https://www.tenable.com/plugins/nnm/720310</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC PCS7 < V9.1 and TIA Portal < 15.2 Unrestricted Upload of File with Dangerous Type (ICSA-19-192-02)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720309</link>
            <guid>https://www.tenable.com/plugins/nnm/720309</guid>
            <pubDate>Mon, 28 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720309 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A remotely exploitable Unrestricted Upload of File with Dangerous Type vulnerability has been identified in SIMATIC PCS7 v8 through v9.0, SIMATIC WinCC (TIA Portal) v14 through v15.1.<br /></span>
      <h3>Description</h3>
      <span>The SIMATIC WinCC DataMonitor web application of the affected products allows an authenticated user with network access to the WinCC DataMonitor application to upload arbitrary ASPX code. Successful exploitation requires no user interaction and may impact the confidentiality, integrity, and availability of the affected device. The vulnerability is relevant only in situations where an attacker has access via the web interface but not to the directory structure.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720309">https://www.tenable.com/plugins/nnm/720309</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Kibana 5.x < 5.6.15 / 6.x < 6.6.1 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nnm/701234</link>
            <guid>https://www.tenable.com/plugins/nnm/701234</guid>
            <pubDate>Thu, 24 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701234 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote web server hosts a Java application that is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>Kibana versions before 5.6.15 and 6.6.1 have the following vulnerabilities:<br /></span><span><br /></span><span>- A cross-site scripting (XSS) vulnerability that could allow an attacker to obtain sensitive information from or perform destructive actions on behalf of other Kibana users. (CVE-2019-7608)<br /></span><span> - An arbitrary code execution flaw in the Timelion visualizer. An attacker with access to the Timelion application could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. (CVE-2019-7609)<br /></span><span> - An arbitrary code execution flaw in the security audit logger. If a Kibana instance has the setting xpack.security.audit.enabled set to true, an attacker could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system. (CVE-2019-7610)<br /></span>
      <h3>Solution</h3>
      <span>Users should upgrade to Kibana version 5.6.15 or 6.6.1<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701234">https://www.tenable.com/plugins/nnm/701234</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020C3800 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765227</link>
            <guid>https://www.tenable.com/plugins/nnm/765227</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765227 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020C3800.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020C3800 is characterized by Motor Voltage of 4.16 kV, Cell Current of 100 A, Shaft output of 597 kW and 800 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765227">https://www.tenable.com/plugins/nnm/765227</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020F4200 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765226</link>
            <guid>https://www.tenable.com/plugins/nnm/765226</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765226 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020F4200.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020F4200 is characterized by Motor Voltage of 4.0 kV, Cell Current of 260 A, Shaft output of 1492 kW and 2000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765226">https://www.tenable.com/plugins/nnm/765226</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020E4170 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765225</link>
            <guid>https://www.tenable.com/plugins/nnm/765225</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765225 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020E4170.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020E4170 is characterized by Motor Voltage of 4.0 kV, Cell Current of 260 A, Shaft output of 1306 kW and 1750 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765225">https://www.tenable.com/plugins/nnm/765225</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020E4150 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765224</link>
            <guid>https://www.tenable.com/plugins/nnm/765224</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765224 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020E4150.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020E4150 is characterized by Motor Voltage of 4.0 kV, Cell Current of 200 A, Shaft output of 1119 kW and 1500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765224">https://www.tenable.com/plugins/nnm/765224</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020D4110 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765223</link>
            <guid>https://www.tenable.com/plugins/nnm/765223</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765223 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020D4110.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020D4110 is characterized by Motor Voltage of 4.0 kV, Cell Current of 140 A, Shaft output of 805 kW and 1079 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765223">https://www.tenable.com/plugins/nnm/765223</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020D4100 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765222</link>
            <guid>https://www.tenable.com/plugins/nnm/765222</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765222 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020D4100.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020D4100 is characterized by Motor Voltage of 4.0 kV, Cell Current of 140 A, Shaft output of 746 kW and 1000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765222">https://www.tenable.com/plugins/nnm/765222</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020C3700 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765221</link>
            <guid>https://www.tenable.com/plugins/nnm/765221</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765221 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020C3700.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020C3700 is characterized by Motor Voltage of 4.0 kV, Cell Current of 100 A, Shaft output of 522 kW and 700 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765221">https://www.tenable.com/plugins/nnm/765221</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020B3600 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765220</link>
            <guid>https://www.tenable.com/plugins/nnm/765220</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765220 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020B3600.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020B3600 is characterized by Motor Voltage of 4.0 kV, Cell Current of 70 A, Shaft output of 401 kW and 538 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765220">https://www.tenable.com/plugins/nnm/765220</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020B3450 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765219</link>
            <guid>https://www.tenable.com/plugins/nnm/765219</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765219 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020B3450.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020B3450 is characterized by Motor Voltage of 4.0 kV, Cell Current of 70 A, Shaft output of 336 kW and 450 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765219">https://www.tenable.com/plugins/nnm/765219</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020A3300 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765218</link>
            <guid>https://www.tenable.com/plugins/nnm/765218</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765218 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020A3300.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020A3300 is characterized by Motor Voltage of 4.0 kV, Cell Current of 40 A, Shaft output of 224 kW and 300 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765218">https://www.tenable.com/plugins/nnm/765218</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020F4170 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765217</link>
            <guid>https://www.tenable.com/plugins/nnm/765217</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765217 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020F4170.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020F4170 is characterized by Motor Voltage of 3.3 kV, Cell Current of 260 A, Shaft output of 1261 kW and 1690 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765217">https://www.tenable.com/plugins/nnm/765217</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020F4150 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765216</link>
            <guid>https://www.tenable.com/plugins/nnm/765216</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765216 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020F4150.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020F4150 is characterized by Motor Voltage of 3.3 kV, Cell Current of 260 A, Shaft output of 1119 kW and 1500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765216">https://www.tenable.com/plugins/nnm/765216</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020E4120 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765215</link>
            <guid>https://www.tenable.com/plugins/nnm/765215</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765215 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020E4120.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020E4120 is characterized by Motor Voltage of 3.3 kV, Cell Current of 200 A, Shaft output of 933 kW and 1250 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765215">https://www.tenable.com/plugins/nnm/765215</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020E4100 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765214</link>
            <guid>https://www.tenable.com/plugins/nnm/765214</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765214 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020E4100.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020E4100 is characterized by Motor Voltage of 3.3 kV, Cell Current of 200 A, Shaft output of 746 kW and 1000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765214">https://www.tenable.com/plugins/nnm/765214</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020D3870 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765213</link>
            <guid>https://www.tenable.com/plugins/nnm/765213</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765213 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020D3870.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020D3870 is characterized by Motor Voltage of 3.3 kV, Cell Current of 140 A, Shaft output of 662 kW and 887 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765213">https://www.tenable.com/plugins/nnm/765213</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020D3800 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765212</link>
            <guid>https://www.tenable.com/plugins/nnm/765212</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765212 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020D3800.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020D3800 is characterized by Motor Voltage of 3.3 kV, Cell Current of 140 A, Shaft output of 597 kW and 800 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765212">https://www.tenable.com/plugins/nnm/765212</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020D3700 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765211</link>
            <guid>https://www.tenable.com/plugins/nnm/765211</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765211 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020D3700.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020D3700 is characterized by Motor Voltage of 3.3 kV, Cell Current of 140 A, Shaft output of 522 kW and 700 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765211">https://www.tenable.com/plugins/nnm/765211</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020C3600 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765210</link>
            <guid>https://www.tenable.com/plugins/nnm/765210</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765210 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020C3600.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020C3600 is characterized by Motor Voltage of 3.3 kV, Cell Current of 100 A, Shaft output of 448 kW and 600 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765210">https://www.tenable.com/plugins/nnm/765210</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020C3500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765209</link>
            <guid>https://www.tenable.com/plugins/nnm/765209</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765209 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020C3500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020C3500 is characterized by Motor Voltage of 3.3 kV, Cell Current of 100 A, Shaft output of 373 kW and 500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765209">https://www.tenable.com/plugins/nnm/765209</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020B3500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765208</link>
            <guid>https://www.tenable.com/plugins/nnm/765208</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765208 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020B3500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020B3500 is characterized by Motor Voltage of 3.3 kV, Cell Current of 70 A, Shaft output of 331 kW and 444 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765208">https://www.tenable.com/plugins/nnm/765208</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020B3400 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765207</link>
            <guid>https://www.tenable.com/plugins/nnm/765207</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765207 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020B3400.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020B3400 is characterized by Motor Voltage of 3.3 kV, Cell Current of 70 A, Shaft output of 298 kW and 400 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765207">https://www.tenable.com/plugins/nnm/765207</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020B3300 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765206</link>
            <guid>https://www.tenable.com/plugins/nnm/765206</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765206 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020B3300.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020B3300 is characterized by Motor Voltage of 3.3 kV, Cell Current of 70 A, Shaft output of 224 kW and 300 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765206">https://www.tenable.com/plugins/nnm/765206</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020A3500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765205</link>
            <guid>https://www.tenable.com/plugins/nnm/765205</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765205 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020A3500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020A3500 is characterized by Motor Voltage of 3.3 kV, Cell Current of 40 A, Shaft output of 189 kW and 254 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765205">https://www.tenable.com/plugins/nnm/765205</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020A3200 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765204</link>
            <guid>https://www.tenable.com/plugins/nnm/765204</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765204 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020A3200.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020A3200 is characterized by Motor Voltage of 3.3 kV, Cell Current of 40 A, Shaft output of 149 kW and 200 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765204">https://www.tenable.com/plugins/nnm/765204</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020A3150 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765203</link>
            <guid>https://www.tenable.com/plugins/nnm/765203</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765203 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020A3150.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020A3150 is characterized by Motor Voltage of 3.3 kV, Cell Current of 40 A, Shaft output of 112 kW and 150 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765203">https://www.tenable.com/plugins/nnm/765203</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020F4120 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765202</link>
            <guid>https://www.tenable.com/plugins/nnm/765202</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765202 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020F4120.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020F4120 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 260 A, Shaft output of 917 kW and 1229 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765202">https://www.tenable.com/plugins/nnm/765202</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020F4110 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765201</link>
            <guid>https://www.tenable.com/plugins/nnm/765201</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765201 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020F4110.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020F4110 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 260 A, Shaft output of 821 kW and 1100 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765201">https://www.tenable.com/plugins/nnm/765201</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020F4100 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765200</link>
            <guid>https://www.tenable.com/plugins/nnm/765200</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765200 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020F4100.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020F4100 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 260 A, Shaft output of 746 kW and 1000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765200">https://www.tenable.com/plugins/nnm/765200</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020E3870 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765199</link>
            <guid>https://www.tenable.com/plugins/nnm/765199</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765199 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020E3870.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020E3870 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 200 A, Shaft output of 671 kW and 900 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765199">https://www.tenable.com/plugins/nnm/765199</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020E3800 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765198</link>
            <guid>https://www.tenable.com/plugins/nnm/765198</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765198 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020E3800.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020E3800 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 200 A, Shaft output of 597 kW and 800 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765198">https://www.tenable.com/plugins/nnm/765198</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020E3700 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765197</link>
            <guid>https://www.tenable.com/plugins/nnm/765197</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765197 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020E3700.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020E3700 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 200 A, Shaft output of 522 kW and 700 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765197">https://www.tenable.com/plugins/nnm/765197</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020D3600 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765196</link>
            <guid>https://www.tenable.com/plugins/nnm/765196</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765196 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020D3600.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020D3600 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 140 A, Shaft output of 448 kW and 600 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765196">https://www.tenable.com/plugins/nnm/765196</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020D3500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765195</link>
            <guid>https://www.tenable.com/plugins/nnm/765195</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765195 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020D3500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020D3500 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 140 A, Shaft output of 373 kW and 500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765195">https://www.tenable.com/plugins/nnm/765195</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52020C3400 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765194</link>
            <guid>https://www.tenable.com/plugins/nnm/765194</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765194 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52020C3400.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52020C3400 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 100 A, Shaft output of 298 kW and 400 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765194">https://www.tenable.com/plugins/nnm/765194</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52026B3400 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765193</link>
            <guid>https://www.tenable.com/plugins/nnm/765193</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765193 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52026B3400.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52026B3400 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 70 A, Shaft output of 241 kW and 323 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765193">https://www.tenable.com/plugins/nnm/765193</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52026B3300 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765192</link>
            <guid>https://www.tenable.com/plugins/nnm/765192</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765192 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52026B3300.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52026B3300 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 70 A, Shaft output of 224 kW and 300 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765192">https://www.tenable.com/plugins/nnm/765192</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52026B3200 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765191</link>
            <guid>https://www.tenable.com/plugins/nnm/765191</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765191 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52026B3200.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52026B3200 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 70 A, Shaft output of 149 kW and 200 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765191">https://www.tenable.com/plugins/nnm/765191</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52026A3200 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765190</link>
            <guid>https://www.tenable.com/plugins/nnm/765190</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765190 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52026A3200.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52026A3200 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 40 A, Shaft output of 138 kW and 184 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765190">https://www.tenable.com/plugins/nnm/765190</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR52026A3150 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765189</link>
            <guid>https://www.tenable.com/plugins/nnm/765189</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765189 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR52026A3150.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR52026A3150 is characterized by Motor Voltage of 2.3/2.4 kV, Cell Current of 40 A, Shaft output of 112 kW and 150 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765189">https://www.tenable.com/plugins/nnm/765189</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR31025K4800 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765188</link>
            <guid>https://www.tenable.com/plugins/nnm/765188</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765188 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR31025K4800.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR31025K4800 is characterized by Motor Voltage of 6.0 kV, Cell Current of 660 A, Shaft output of 5554 kW and 7445 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765188">https://www.tenable.com/plugins/nnm/765188</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR31025K4700 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765187</link>
            <guid>https://www.tenable.com/plugins/nnm/765187</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765187 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR31025K4700.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR31025K4700 is characterized by Motor Voltage of 6.0 kV, Cell Current of 660 A, Shaft output of 5222 kW and 7000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765187">https://www.tenable.com/plugins/nnm/765187</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022H4450 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765186</link>
            <guid>https://www.tenable.com/plugins/nnm/765186</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765186 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022H4450.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022H4450 is characterized by Motor Voltage of 6.0 kV, Cell Current of 375 A, Shaft output of 3306 kW and 4432 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765186">https://www.tenable.com/plugins/nnm/765186</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022H4400 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765185</link>
            <guid>https://www.tenable.com/plugins/nnm/765185</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765185 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022H4400.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022H4400 is characterized by Motor Voltage of 6.0 kV, Cell Current of 375 A, Shaft output of 2984 kW and 4000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765185">https://www.tenable.com/plugins/nnm/765185</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022G4370 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765184</link>
            <guid>https://www.tenable.com/plugins/nnm/765184</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765184 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022G4370.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022G4370 is characterized by Motor Voltage of 6.0 kV, Cell Current of 315 A, Shaft output of 2777 kW and 3722 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765184">https://www.tenable.com/plugins/nnm/765184</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022G4350 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765183</link>
            <guid>https://www.tenable.com/plugins/nnm/765183</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765183 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022G4350.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022G4350 is characterized by Motor Voltage of 6.0 kV, Cell Current of 315 A, Shaft output of 2611 kW and 3500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765183">https://www.tenable.com/plugins/nnm/765183</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022F4350 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765182</link>
            <guid>https://www.tenable.com/plugins/nnm/765182</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765182 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022F4350.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022F4350 is characterized by Motor Voltage of 6.0 kV, Cell Current of 260 A, Shaft output of 2292 kW and 3073 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765182">https://www.tenable.com/plugins/nnm/765182</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022F4300 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765181</link>
            <guid>https://www.tenable.com/plugins/nnm/765181</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765181 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022F4300.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022F4300 is characterized by Motor Voltage of 6.0 kV, Cell Current of 260 A, Shaft output of 2238 kW and 3000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765181">https://www.tenable.com/plugins/nnm/765181</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022F4250 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765180</link>
            <guid>https://www.tenable.com/plugins/nnm/765180</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765180 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022F4250.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022F4250 is characterized by Motor Voltage of 6.0 kV, Cell Current of 260 A, Shaft output of 1865 kW and 2500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765180">https://www.tenable.com/plugins/nnm/765180</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022E4250 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765179</link>
            <guid>https://www.tenable.com/plugins/nnm/765179</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765179 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022E4250.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022E4250 is characterized by Motor Voltage of 6.0 kV, Cell Current of 200 A, Shaft output of 1763 kW and 2363 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765179">https://www.tenable.com/plugins/nnm/765179</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022E4220 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765178</link>
            <guid>https://www.tenable.com/plugins/nnm/765178</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765178 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022E4220.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022E4220 is characterized by Motor Voltage of 6.0 kV, Cell Current of 200 A, Shaft output of 1679 kW and 2250 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765178">https://www.tenable.com/plugins/nnm/765178</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022E4200 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765177</link>
            <guid>https://www.tenable.com/plugins/nnm/765177</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765177 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022E4200.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022E4200 is characterized by Motor Voltage of 6.0 kV, Cell Current of 200 A, Shaft output of 1492 kW and 2000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765177">https://www.tenable.com/plugins/nnm/765177</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022E4170 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765176</link>
            <guid>https://www.tenable.com/plugins/nnm/765176</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765176 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022E4170.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022E4170 is characterized by Motor Voltage of 6.0 kV, Cell Current of 200 A, Shaft output of 1306 kW and 1750 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765176">https://www.tenable.com/plugins/nnm/765176</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022D4170 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765175</link>
            <guid>https://www.tenable.com/plugins/nnm/765175</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765175 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022D4170.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022D4170 is characterized by Motor Voltage of 6.0 kV, Cell Current of 140 A, Shaft output of 1203 kW and 1613 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765175">https://www.tenable.com/plugins/nnm/765175</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022D4150 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765174</link>
            <guid>https://www.tenable.com/plugins/nnm/765174</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765174 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022D4150.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022D4150 is characterized by Motor Voltage of 6.0 kV, Cell Current of 140 A, Shaft output of 1119 kW and 1500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765174">https://www.tenable.com/plugins/nnm/765174</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022D4120 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765173</link>
            <guid>https://www.tenable.com/plugins/nnm/765173</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765173 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022D4120.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022D4120 is characterized by Motor Voltage of 6.0 kV, Cell Current of 140 A, Shaft output of 933 kW and 1250 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765173">https://www.tenable.com/plugins/nnm/765173</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022C4120 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765172</link>
            <guid>https://www.tenable.com/plugins/nnm/765172</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765172 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022C4120.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022C4120 is characterized by Motor Voltage of 6.0 kV, Cell Current of 100 A, Shaft output of 860 kW and 1152 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765172">https://www.tenable.com/plugins/nnm/765172</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022C4100 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765171</link>
            <guid>https://www.tenable.com/plugins/nnm/765171</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765171 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022C4100.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022C4100 is characterized by Motor Voltage of 6.0 kV, Cell Current of 100 A, Shaft output of 746 kW and 1000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765171">https://www.tenable.com/plugins/nnm/765171</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022C3870 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765170</link>
            <guid>https://www.tenable.com/plugins/nnm/765170</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765170 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022C3870.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022C3870 is characterized by Motor Voltage of 6.0 kV, Cell Current of 100 A, Shaft output of 671 kW and 900 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765170">https://www.tenable.com/plugins/nnm/765170</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022B3870 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765169</link>
            <guid>https://www.tenable.com/plugins/nnm/765169</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765169 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022B3870.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022B3870 is characterized by Motor Voltage of 6.0 kV, Cell Current of 70 A, Shaft output of 602 kW and 807 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765169">https://www.tenable.com/plugins/nnm/765169</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022B3800 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765168</link>
            <guid>https://www.tenable.com/plugins/nnm/765168</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765168 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022B3800.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022B3800 is characterized by Motor Voltage of 6.0 kV, Cell Current of 70 A, Shaft output of 597 kW and 800 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765168">https://www.tenable.com/plugins/nnm/765168</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022B3700 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765167</link>
            <guid>https://www.tenable.com/plugins/nnm/765167</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765167 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022B3700.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022B3700 is characterized by Motor Voltage of 6.0 kV, Cell Current of 70 A, Shaft output of 522 kW and 700 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765167">https://www.tenable.com/plugins/nnm/765167</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022B3600 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765166</link>
            <guid>https://www.tenable.com/plugins/nnm/765166</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765166 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022B3600.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022B3600 is characterized by Motor Voltage of 6.0 kV, Cell Current of 70 A, Shaft output of 448 kW and 600 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765166">https://www.tenable.com/plugins/nnm/765166</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022B3500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765165</link>
            <guid>https://www.tenable.com/plugins/nnm/765165</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765165 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022B3500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022B3500 is characterized by Motor Voltage of 6.0 kV, Cell Current of 70 A, Shaft output of 373 kW and 500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765165">https://www.tenable.com/plugins/nnm/765165</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022A3500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765164</link>
            <guid>https://www.tenable.com/plugins/nnm/765164</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765164 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022A3500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022A3500 is characterized by Motor Voltage of 6.0 kV, Cell Current of 40 A, Shaft output of 344 kW and 461 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765164">https://www.tenable.com/plugins/nnm/765164</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022A3400 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765163</link>
            <guid>https://www.tenable.com/plugins/nnm/765163</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765163 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022A3400.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022A3400 is characterized by Motor Voltage of 6.0 kV, Cell Current of 40 A, Shaft output of 298 kW and 400 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765163">https://www.tenable.com/plugins/nnm/765163</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41022A3300 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765162</link>
            <guid>https://www.tenable.com/plugins/nnm/765162</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765162 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41022A3300.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41022A3300 is characterized by Motor Voltage of 6.0 kV, Cell Current of 40 A, Shaft output of 224 kW and 300 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765162">https://www.tenable.com/plugins/nnm/765162</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR31023K4600 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765161</link>
            <guid>https://www.tenable.com/plugins/nnm/765161</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765161 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR31023K4600.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR31023K4600 is characterized by Motor Voltage of 4.0/4.16 kV, Cell Current of 660 A, Shaft output of 3851 kW and 5162 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765161">https://www.tenable.com/plugins/nnm/765161</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR31023K4500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765160</link>
            <guid>https://www.tenable.com/plugins/nnm/765160</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765160 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR31023K4500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR31023K4500 is characterized by Motor Voltage of 4.0/4.16 kV, Cell Current of 660 A, Shaft output of 3730 kW and 5000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765160">https://www.tenable.com/plugins/nnm/765160</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR31023J4500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765159</link>
            <guid>https://www.tenable.com/plugins/nnm/765159</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765159 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR31023J4500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR31023J4500 is characterized by Motor Voltage of 4.0/4.16 kV, Cell Current of 500 A, Shaft output of 3056 kW and 4097 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765159">https://www.tenable.com/plugins/nnm/765159</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR31023J4400 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765158</link>
            <guid>https://www.tenable.com/plugins/nnm/765158</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765158 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR31023J4400.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR31023J4400 is characterized by Motor Voltage of 4.0/4.16 kV, Cell Current of 500 A, Shaft output of 2984 kW and 4000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765158">https://www.tenable.com/plugins/nnm/765158</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR31023J4350 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765157</link>
            <guid>https://www.tenable.com/plugins/nnm/765157</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765157 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR31023J4350.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR31023J4350 is characterized by Motor Voltage of 4.0/4.16 kV, Cell Current of 500 A, Shaft output of 2611 kW and 3500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765157">https://www.tenable.com/plugins/nnm/765157</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020D4110 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765156</link>
            <guid>https://www.tenable.com/plugins/nnm/765156</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765156 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020D4110.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020D4110 is characterized by Motor Voltage of 4.0/4.16 kV, Cell Current of 140 A, Shaft output of 802 kW and 1075 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765156">https://www.tenable.com/plugins/nnm/765156</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020D4100 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765155</link>
            <guid>https://www.tenable.com/plugins/nnm/765155</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765155 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020D4100.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020D4100 is characterized by Motor Voltage of 4.0/4.16 kV, Cell Current of 140 A, Shaft output of 746 kW and 1000 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765155">https://www.tenable.com/plugins/nnm/765155</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020D3870 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765154</link>
            <guid>https://www.tenable.com/plugins/nnm/765154</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765154 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020D3870.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020D3870 is characterized by Motor Voltage of 3.3 kV, Cell Current of 140 A, Shaft output of 662 kW and 887 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765154">https://www.tenable.com/plugins/nnm/765154</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020D3800 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765153</link>
            <guid>https://www.tenable.com/plugins/nnm/765153</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765153 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020D3800.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020D3800 is characterized by Motor Voltage of 3.3 kV, Cell Current of 140 A, Shaft output of 597 kW and 800 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765153">https://www.tenable.com/plugins/nnm/765153</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020D3700 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765152</link>
            <guid>https://www.tenable.com/plugins/nnm/765152</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765152 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020D3700.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020D3700 is characterized by Motor Voltage of 3.3 kV, Cell Current of 140 A, Shaft output of 522 kW and 700 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765152">https://www.tenable.com/plugins/nnm/765152</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020C3700 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765151</link>
            <guid>https://www.tenable.com/plugins/nnm/765151</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765151 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020C3700.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020C3700 is characterized by Motor Voltage of 3.3 kV, Cell Current of 100 A, Shaft output of 473 kW and 634 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765151">https://www.tenable.com/plugins/nnm/765151</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020C3600 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765150</link>
            <guid>https://www.tenable.com/plugins/nnm/765150</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765150 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020C3600.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020C3600 is characterized by Motor Voltage of 3.3 kV, Cell Current of 100 A, Shaft output of 448 kW and 600 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765150">https://www.tenable.com/plugins/nnm/765150</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020C3500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765149</link>
            <guid>https://www.tenable.com/plugins/nnm/765149</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765149 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020C3500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020C3500 is characterized by Motor Voltage of 3.3 kV, Cell Current of 100 A, Shaft output of 373 kW and 500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765149">https://www.tenable.com/plugins/nnm/765149</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020C3450 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765148</link>
            <guid>https://www.tenable.com/plugins/nnm/765148</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765148 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020C3450.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020C3450 is characterized by Motor Voltage of 3.3 kV, Cell Current of 100 A, Shaft output of 366 kW and 450 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765148">https://www.tenable.com/plugins/nnm/765148</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020B3450 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765147</link>
            <guid>https://www.tenable.com/plugins/nnm/765147</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765147 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020B3450.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020B3450 is characterized by Motor Voltage of 3.3 kV, Cell Current of 70 A, Shaft output of 331 kW and 444 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765147">https://www.tenable.com/plugins/nnm/765147</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020B3400 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765146</link>
            <guid>https://www.tenable.com/plugins/nnm/765146</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765146 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020B3400.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020B3400 is characterized by Motor Voltage of 3.3 kV, Cell Current of 70 A, Shaft output of 298 kW and 400 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765146">https://www.tenable.com/plugins/nnm/765146</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020B3300 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765145</link>
            <guid>https://www.tenable.com/plugins/nnm/765145</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765145 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020B3300.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020B3300 is characterized by Motor Voltage of 3.3 kV, Cell Current of 70 A, Shaft output of 224 kW and 300 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765145">https://www.tenable.com/plugins/nnm/765145</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020A3300 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765144</link>
            <guid>https://www.tenable.com/plugins/nnm/765144</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765144 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020A3300.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020A3300 is characterized by Motor Voltage of 3.3 kV, Cell Current of 40 A, Shaft output of 189 kW and 254 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765144">https://www.tenable.com/plugins/nnm/765144</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020A3200 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765143</link>
            <guid>https://www.tenable.com/plugins/nnm/765143</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765143 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020A3200.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020A3200 is characterized by Motor Voltage of 3.3 kV, Cell Current of 40 A, Shaft output of 149 kW and 200 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765143">https://www.tenable.com/plugins/nnm/765143</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020D3600 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765142</link>
            <guid>https://www.tenable.com/plugins/nnm/765142</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765142 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020D3600.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020D3600 is characterized by Motor Voltage of 2.4 kV, Cell Current of 140 A, Shaft output of 448 kW and 600 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765142">https://www.tenable.com/plugins/nnm/765142</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020D3500 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765141</link>
            <guid>https://www.tenable.com/plugins/nnm/765141</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765141 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020D3500.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020D3500 is characterized by Motor Voltage of 2.4 kV, Cell Current of 140 A, Shaft output of 373 kW and 500 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765141">https://www.tenable.com/plugins/nnm/765141</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020C3400 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765140</link>
            <guid>https://www.tenable.com/plugins/nnm/765140</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765140 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020C3400.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020C3400 is characterized by Motor Voltage of 2.4 kV, Cell Current of 100 A, Shaft output of 298 kW and 400 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765140">https://www.tenable.com/plugins/nnm/765140</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 6SR41020B3200 Medium-Voltage Drive]]></title>
            <link>https://www.tenable.com/plugins/nnm/765139</link>
            <guid>https://www.tenable.com/plugins/nnm/765139</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765139 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens Sinamics Perfect Harmony GH180 Drive has been detected with model number 6SR41020B3200.<br /></span>
      <h3>Description</h3>
      <span>The Siemens GH180 drive accomodates power range of 180 kVA to 23.8 MVA and used with Induction and Synchronous Motors without requiring additional output or dv / dt filters. It delivers total drive system efficiency of 96.5 percent. 6SR41020B3200 is characterized by Motor Voltage of 2.4 kV, Cell Current of 70 A, Shaft output of 149 kW and 200 Hp.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765139">https://www.tenable.com/plugins/nnm/765139</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 Fieldbus Network Improper Input Validation DoS (ICSA-19-134-06)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720306</link>
            <guid>https://www.tenable.com/plugins/nnm/720306</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720306 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An improperly configured parameter read/write execution via fieldbus network may cause the controller to restart. An attacker with access to the fieldbus network could cause a denial-of-service condition by sending specially crafted packets.<br /></span>
      <h3>Description</h3>
      <span>A vulnerability has been identified in Siemens Sinamics Perfect Harmony GH180 Fieldbus Network. The vulnerability could be exploited by an attacker with network access to the device. Successful exploitation requires no privileges and no user interaction. An attacker could use the vulnerability to compromise the availability of the affected system.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720306">https://www.tenable.com/plugins/nnm/720306</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens Sinamics Perfect Harmony GH180 Drives Uncontrolled Resource Consumption DoS (ICSA-19-134-05)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720305</link>
            <guid>https://www.tenable.com/plugins/nnm/720305</guid>
            <pubDate>Tue, 15 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720305 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Successful exploitation of this vulnerability could allow an attacker with access to the Ethernet Modbus Interface to cause a denial-of-service condition exceeding the number of available connections.<br /></span>
      <h3>Description</h3>
      <span>A vulnerability has been identified in Siemens Sinamics Perfect Harmony GH180 Drives. Successful exploitation requires no privileges and no user interaction. An attacker with network access to the device could use the vulnerability to compromise availability of the affected system.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720305">https://www.tenable.com/plugins/nnm/720305</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens LOGO! 230RCE PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765138</link>
            <guid>https://www.tenable.com/plugins/nnm/765138</guid>
            <pubDate>Mon, 07 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765138 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens LOGO! 230RCE PLC has been detected with model number 6ED1052-1FB00-0BA8.<br /></span>
      <h3>Description</h3>
      <span>A LOGO! 230RCE PLC with model number 6ED1052-1FB00-0BA8 has been detected. It is described by Siemens as LOGO! 230RCE,logic module, display PS/I/O: 115V/230V/relay, 8 DI/4 DO, memory 400 blocks, modular expandable, Ethernet, integr. web server, data log, user-defined Web pages, standard microSD card for LOGO! Soft Comfort V8 or higher, older projects executable.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765138">https://www.tenable.com/plugins/nnm/765138</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens LOGO! 24RCE PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765137</link>
            <guid>https://www.tenable.com/plugins/nnm/765137</guid>
            <pubDate>Mon, 07 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765137 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens LOGO! 24RCE PLC has been detected with model number 6ED1052-1HB00-0BA8.<br /></span>
      <h3>Description</h3>
      <span>A LOGO! 24RCE PLC with model number 6ED1052-1HB00-0BA8 has been detected. It is described by Siemens as LOGO! 24RCE, logic module,Display PS/I/O: 24 V AC/24 V DC/relay, 8 DI/4 DO, memory 400 blocks, modular expandable, Ethernet, integr. web server, data log, user-defined Web pages, standard microSD card for LOGO! Soft Comfort V8 or higher, older projects executable.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765137">https://www.tenable.com/plugins/nnm/765137</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens LOGO! 12/24RCE PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765136</link>
            <guid>https://www.tenable.com/plugins/nnm/765136</guid>
            <pubDate>Mon, 07 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765136 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens LOGO! 12/24RCE PLC has been detected with model number 6ED1052-1MD00-0BA8.<br /></span>
      <h3>Description</h3>
      <span>A LOGO! 12/24RCE PLC with model number 6ED1052-1MD00-0BA8 has been detected. It is described by Siemens as LOGO! 12/24RCE, logic module, disp PS/I/O: 12/24VDC/relay, 8 DI (4AI)/4DO, memory 400 blocks, modular expandable, Ethernet, integr. web server, data log, user-defined Web pages, standard microSD card for LOGO! Soft Comfort V8 or higher, older projects executable.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765136">https://www.tenable.com/plugins/nnm/765136</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens LOGO! 24CE PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765135</link>
            <guid>https://www.tenable.com/plugins/nnm/765135</guid>
            <pubDate>Mon, 07 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765135 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens LOGO! 24CE PLC has been detected with model number 6ED1052-1CC00-0BA8.<br /></span>
      <h3>Description</h3>
      <span>A LOGO! 24CE PLC with model number 6ED1052-1CC00-0BA8 has been detected. It is described by Siemens as LOGO! 24CE, logic module, Display PS/I/O: 24 V/24 V/24 V trans., 8 DI (4AI)/4DO, memory 400 blocks, modular expandable, Ethernet integr. web server, data log, standard microSD card for LOGO! SOFT Comfort V8 or higher older projects executable.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765135">https://www.tenable.com/plugins/nnm/765135</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens LOGO!8 BM PLC Missing Authentication and Plaintext Storage of a Password (ICSA-19-134-04)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720307</link>
            <guid>https://www.tenable.com/plugins/nnm/720307</guid>
            <pubDate>Mon, 07 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720307 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A vulnerability has been identified in LOGO!8 BM (All versions). Attackers with access to port 10005/tcp could perform device reconfigurations and obtain project files from the devices. <br /></span>
      <h3>Description</h3>
      <span>A vulnerability has been identified in Siemens LOGO!8 BM devices. The security vulnerability could be exploited by an unauthenticated attacker with network access to port 10005/tcp. No user interaction is required to exploit this security vulnerability. The vulnerability impacts confidentiality, integrity, and availability of the device.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720307">https://www.tenable.com/plugins/nnm/720307</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens LOGO!8 PLC < 1.82.02 Improper Restriction within Memory Buffer or Session Fixation DoS (ICSA-19-162-03)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720304</link>
            <guid>https://www.tenable.com/plugins/nnm/720304</guid>
            <pubDate>Mon, 07 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720304 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A vulnerability has been identified in Siemens LOGO! devices allowing an attacker to cause a denial-of-service condition by using TCP port 10005 or stale Session ID.<br /></span>
      <h3>Description</h3>
      <span>A vulnerability has been identified in Siemens LOGO! devices before V1.82.02. An attacker with network access to the port 10005/tcp could exploit improper restriction of operations within the bounds of a memory buffer. Alternatively, and attacker may obtain the session ID of an active user session. The integrated webserver does not invalidate the Session ID upon user logout.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720304">https://www.tenable.com/plugins/nnm/720304</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Windows OS Detection Via Snow Agent]]></title>
            <link>https://www.tenable.com/plugins/nnm/701224</link>
            <guid>https://www.tenable.com/plugins/nnm/701224</guid>
            <pubDate>Mon, 07 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701224 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is running the Windows operating system.<br /></span>
      <h3>Description</h3>
      <span>The remote host is running the Windows operating system.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701224">https://www.tenable.com/plugins/nnm/701224</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Snow Inventory Agent Detection (User-Agent)]]></title>
            <link>https://www.tenable.com/plugins/nnm/701223</link>
            <guid>https://www.tenable.com/plugins/nnm/701223</guid>
            <pubDate>Mon, 07 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701223 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host shows the Snow Inventory Agent user-agent string.<br /></span>
      <h3>Description</h3>
      <span>The remote host shows the Snow Inventory Agent user-agent string.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701223">https://www.tenable.com/plugins/nnm/701223</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q64RPN Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765134</link>
            <guid>https://www.tenable.com/plugins/nnm/765134</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765134 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q64RPN.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q64RPN is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 100-240 V AC, Output: 5V DC; 8.5 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765134">https://www.tenable.com/plugins/nnm/765134</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q64PN Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765133</link>
            <guid>https://www.tenable.com/plugins/nnm/765133</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765133 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q64PN.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q64PN is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 100-240 V AC, Output: 5V DC; 8.5 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765133">https://www.tenable.com/plugins/nnm/765133</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q64RP Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765132</link>
            <guid>https://www.tenable.com/plugins/nnm/765132</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765132 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q64RP.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q64RP is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 100-120 V AC; 200-240 V AC, Output: 5V DC; 8.5 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765132">https://www.tenable.com/plugins/nnm/765132</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q63RP Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765131</link>
            <guid>https://www.tenable.com/plugins/nnm/765131</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765131 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q63RP.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q63RP is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 24 V DC, Output: 5V DC; 8.5 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765131">https://www.tenable.com/plugins/nnm/765131</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q63P Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765130</link>
            <guid>https://www.tenable.com/plugins/nnm/765130</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765130 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q63P.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q63P is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 24 V DC, Output: 5V DC; 6 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765130">https://www.tenable.com/plugins/nnm/765130</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q62P Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765129</link>
            <guid>https://www.tenable.com/plugins/nnm/765129</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765129 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q62P.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q62P is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 100-240 V AC, Output: 5V DC; 3 A / 24V DC; 0.6 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765129">https://www.tenable.com/plugins/nnm/765129</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q61SP Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765128</link>
            <guid>https://www.tenable.com/plugins/nnm/765128</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765128 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q61SP.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q61SP is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 100-240 V AC, Output: 5V DC; 2 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765128">https://www.tenable.com/plugins/nnm/765128</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q61P-D Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765127</link>
            <guid>https://www.tenable.com/plugins/nnm/765127</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765127 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q61P-D.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q61P-D is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 100-240 V AC, Output: 5V DC; 6 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765127">https://www.tenable.com/plugins/nnm/765127</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q61P-A2 Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765126</link>
            <guid>https://www.tenable.com/plugins/nnm/765126</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765126 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q61P-A2.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q61P-A2 is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 200-240 V AC, Output: 5V DC; 6 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765126">https://www.tenable.com/plugins/nnm/765126</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q61P-A1 Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765125</link>
            <guid>https://www.tenable.com/plugins/nnm/765125</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765125 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q61P-A1.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q61P-A1 is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 100-120 V AC, Output: 5V DC; 6 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765125">https://www.tenable.com/plugins/nnm/765125</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mitsubishi Q61P Power Supply Unit Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765124</link>
            <guid>https://www.tenable.com/plugins/nnm/765124</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765124 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Mitsubishi Power Supply Unit (PSU) has been detected with model number Q61P.<br /></span>
      <h3>Description</h3>
      <span>The Mitsubishi Q61P is used to supply power to the CPU unit, input/output unit and various other units. It is described by Mitsubishi as Input: 100-240 V AC, Output: 5 V DC; 6 A.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765124">https://www.tenable.com/plugins/nnm/765124</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Lighthouse Remote R1104LD Airborne Particle Counter Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765123</link>
            <guid>https://www.tenable.com/plugins/nnm/765123</guid>
            <pubDate>Fri, 04 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765123 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Lighthouse Remote Airborne Particle Counter has been detected with model number R1104LD.<br /></span>
      <h3>Description</h3>
      <span>The Lighthouse R1104LD is a Remote Airborne Particle Counter with laser optical particle counting technology. R1104LD has 8 particle size channels starting at 0.1 microns at a flow of 1.0 CFM.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765123">https://www.tenable.com/plugins/nnm/765123</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SIMATIC RF6XXR < 3.2.1 Multiple Vulnerabilities (ICSA-19-192-04)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720302</link>
            <guid>https://www.tenable.com/plugins/nnm/720302</guid>
            <pubDate>Wed, 02 Oct 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720302 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Siemens SIMATIC RF6XXR UHF RFID devices prior to 3.2.1 are vulnerable to multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>Siemens SIMATIC RF6XXR UHF RFID devices prior to 3.2.1 are affected by mutiple attack vectors. Successful exploitation of these vulnerabilities could allow the transmission of plaintext data in various ways. <br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720302">https://www.tenable.com/plugins/nnm/720302</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rockwell Automation Stratix Ethernet Switches < 15.3 IOS Improper Input Validation and Resource Management Errors (ICSA-18-107-04)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720288</link>
            <guid>https://www.tenable.com/plugins/nnm/720288</guid>
            <pubDate>Tue, 24 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720288 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Rockwell Automation/Allen-Bradley Stratix Ethernet Switches &lt; 15.3 IOS may be be exploitable remotely because of the improper Input Validation and Resource Management.<br /></span>
      <h3>Description</h3>
      <span>Successful exploitation of multiple vulnerabilities in Rockwell Automation Stratix Ethernet Switches < 15.3 could result in a loss of availability, confidentiality, and/or integrity caused by memory exhaustion, module restart, information corruption, and/or information exposure.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720288">https://www.tenable.com/plugins/nnm/720288</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rockwell Automation Stratix 8300 Ethernet Switches < 15.3 IOS Improper Input Validation and Resource Management Errors (ICSA-18-107-05)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720287</link>
            <guid>https://www.tenable.com/plugins/nnm/720287</guid>
            <pubDate>Tue, 24 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720287 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Rockwell Automation/Allen-Bradley Stratix 8300 Ethernet Switches &lt; 15.3 IOS may be be exploitable remotely because of the improper Input Validation and Resource Management.<br /></span>
      <h3>Description</h3>
      <span>Successful exploitation of multiple vulnerabilities in Rockwell Automation Stratix 8300 Ethernet Switches < 15.3 could result in a loss of availability, confidentiality, and/or integrity caused by memory exhaustion, module restart, information corruption, and/or information exposure.<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720287">https://www.tenable.com/plugins/nnm/720287</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rockwell Automation CompactLogix  <= v30.014 Uncontrolled Resource Consumption or Stack-based Buffer Overflow (ICSA-19-120-01)]]></title>
            <link>https://www.tenable.com/plugins/nnm/720278</link>
            <guid>https://www.tenable.com/plugins/nnm/720278</guid>
            <pubDate>Tue, 24 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 720278 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>Rockwell Automation/Allen-Bradley CompactLogix 5370 L1, L2 and L3 controllers including CompactLogix GuardLogix could allow a remote attacker to render the web server unavailable and/or place the controller in a major non-recoverable faulted state.<br /></span>
      <h3>Description</h3>
      <span>An attacker could send a crafted HTTP/HTTPS request to render the web server unavailable and/or lead to remote code execution caused by a stack-based buffer overflow vulnerability. A cold restart would be required to recover the system. An attacker could also send crafted SMTP packets to cause a denial-of-service condition where the controller enters a major non-recoverable faulted state (MNRF).<br /></span>
      <h3>Solution</h3>
      <span>Perform vendor recommended mitigations and apply available vendor upgrades.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/720278">https://www.tenable.com/plugins/nnm/720278</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apple iOS < 12.4.1 Use-After-Free (SockPuppet)]]></title>
            <link>https://www.tenable.com/plugins/nnm/701155</link>
            <guid>https://www.tenable.com/plugins/nnm/701155</guid>
            <pubDate>Fri, 20 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 701155 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Apple iDevices running iOS 11.0 through 12.4 (excluding 12.3, 12.3.1 and iOS 13.0) are affected by a use-after-free vulnerability. <br /></span>
      <h3>Description</h3>
      <span>Apple iDevices running iOS 11.0 through 12.4 (excluding 12.3, 12.3.1 and iOS 13.0) are affected by a use-after-free vulnerability. Affected devices are not only capable of being jailbroken, but can also be exploited by attackers.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apple iOS version 12.4.1 or later. If 12.4.1 is not avaialble, 12.3, 12.3.1 and iOS 13.0 beta are currently considered not vulnerable and if users are running any of these versions, they are advised to remain on them until the 12.4.1 patch is available.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/701155">https://www.tenable.com/plugins/nnm/701155</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X-400 Product Family Switch Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765122</link>
            <guid>https://www.tenable.com/plugins/nnm/765122</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765122 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X-400 product family switch has been detected.<br /></span>
      <h3>Description</h3>
      <span>A Siemens SCALANCE X-400 product family switch has been detected. The SCALANCE X-400 product family are managed industrial ethernet switches.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765122">https://www.tenable.com/plugins/nnm/765122</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X-300 Product Family Switch Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765121</link>
            <guid>https://www.tenable.com/plugins/nnm/765121</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765121 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X-300 product family switch has been detected.<br /></span>
      <h3>Description</h3>
      <span>A Siemens SCALANCE X-300 product family switch has been detected. The SCALANCE X-300 product family are managed industrial ethernet switches.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765121">https://www.tenable.com/plugins/nnm/765121</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens S7-1500 Series PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765120</link>
            <guid>https://www.tenable.com/plugins/nnm/765120</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765120 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens S7-1500 Series Programmable Logic Controller (PLC) has been detected.<br /></span>
      <h3>Description</h3>
      <span>A Siemens S7-1500 Series PLC has been detected. The Siemens S7-1500 Series is a family of PLCs which supports the manufacturer's own proprietary S7 protocol.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765120">https://www.tenable.com/plugins/nnm/765120</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens S7-1200 Series PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765119</link>
            <guid>https://www.tenable.com/plugins/nnm/765119</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765119 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens S7-1200 Series Programmable Logic Controller (PLC) has been detected.<br /></span>
      <h3>Description</h3>
      <span>A Siemens S7-1200 Series PLC has been detected. The Siemens S7-1200 Series is a family of PLCs which supports the manufacturer's own proprietary S7 protocol.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765119">https://www.tenable.com/plugins/nnm/765119</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens S7-400 Series PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765118</link>
            <guid>https://www.tenable.com/plugins/nnm/765118</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765118 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens S7-400 Series Programmable Logic Controller (PLC) has been detected.<br /></span>
      <h3>Description</h3>
      <span>A Siemens S7-400 Series PLC has been detected. The Siemens S7-400 Series is a family of PLCs which supports the manufacturer's own proprietary S7 protocol.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765118">https://www.tenable.com/plugins/nnm/765118</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens S7-300 Series PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765117</link>
            <guid>https://www.tenable.com/plugins/nnm/765117</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765117 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens S7-300 Series Programmable Logic Controller (PLC) has been detected.<br /></span>
      <h3>Description</h3>
      <span>A Siemens S7-300 Series PLC has been detected. The Siemens S7-300 Series is a family of PLCs which supports the manufacturer's own proprietary S7 protocol.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765117">https://www.tenable.com/plugins/nnm/765117</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens S7-200 Series PLC Detection]]></title>
            <link>https://www.tenable.com/plugins/nnm/765116</link>
            <guid>https://www.tenable.com/plugins/nnm/765116</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765116 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens S7-200 Series Programmable Logic Controller (PLC) has been detected.<br /></span>
      <h3>Description</h3>
      <span>A Siemens S7-200 Series PLC has been detected. The Siemens S7-200 Series is a family of PLCs which supports the manufacturer's own proprietary S7 protocol.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765116">https://www.tenable.com/plugins/nnm/765116</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP993-1LH]]></title>
            <link>https://www.tenable.com/plugins/nnm/765107</link>
            <guid>https://www.tenable.com/plugins/nnm/765107</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765107 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP993-1LH has been detected with model number 6GK5993-1AV00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5993-1AV00-8AA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP993-1LH; 1x 10000 Mbit/s LC port, optical; single-mode optical up to max of 40 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765107">https://www.tenable.com/plugins/nnm/765107</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP993-1LD]]></title>
            <link>https://www.tenable.com/plugins/nnm/765106</link>
            <guid>https://www.tenable.com/plugins/nnm/765106</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765106 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP993-1LD has been detected with model number 6GK5993-1AU00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5993-1AU00-8AA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP993-1LD; 1x 10000 Mbit/s LC port, optical; single-mode optical up to max of 10 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765106">https://www.tenable.com/plugins/nnm/765106</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP993-1]]></title>
            <link>https://www.tenable.com/plugins/nnm/765105</link>
            <guid>https://www.tenable.com/plugins/nnm/765105</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765105 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP993-1 has been detected with model number 6GK5993-1AT00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5993-1AT00-8AA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP993-1; 1x 10000 Mbit/s LC port, optical; multimode optical up to max of 300 m. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765105">https://www.tenable.com/plugins/nnm/765105</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP992-1ELH]]></title>
            <link>https://www.tenable.com/plugins/nnm/765104</link>
            <guid>https://www.tenable.com/plugins/nnm/765104</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765104 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP992-1ELH has been detected with model number 6GK5992-1AQ00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5992-1AQ00-8AA0 is described by Siemens as SCALANCE X accessory, Plug-in transceiver SFP992-1ELH 1x 1000 Mbit/s LC port, optical single-mode up to max of 120 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765104">https://www.tenable.com/plugins/nnm/765104</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP992-1LH+]]></title>
            <link>https://www.tenable.com/plugins/nnm/765103</link>
            <guid>https://www.tenable.com/plugins/nnm/765103</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765103 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP992-1LH+ has been detected with model number 6GK5992-1AP00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5992-1AP00-8AA0 is described by Siemens as SCALANCE X accessory, Plug-in transceiver SFP992-1LH+ 1x 1000 Mbit/s LC port, optical; single-mode optical up to max of 70 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765103">https://www.tenable.com/plugins/nnm/765103</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP992-1LH]]></title>
            <link>https://www.tenable.com/plugins/nnm/765102</link>
            <guid>https://www.tenable.com/plugins/nnm/765102</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765102 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP992-1LH has been detected with model number 6GK5992-1AN00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5992-1AN00-8AA0 is described by Siemens as SCALANCE X accessory, Plug-in transceiver SFP992-1LH 1x 1000 Mbit/s LC port, optical single-mode up to max of 40 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765102">https://www.tenable.com/plugins/nnm/765102</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP992-1LD]]></title>
            <link>https://www.tenable.com/plugins/nnm/765101</link>
            <guid>https://www.tenable.com/plugins/nnm/765101</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765101 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP992-1LD has been detected with model number 6GK5992-1AM00-8FA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5992-1AM00-8FA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP992-1LD; 1x 1000 Mbit/s LC port, with Conform Coating; optical; Singlemode glass up to max of 10 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765101">https://www.tenable.com/plugins/nnm/765101</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP992-1LD]]></title>
            <link>https://www.tenable.com/plugins/nnm/765100</link>
            <guid>https://www.tenable.com/plugins/nnm/765100</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765100 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP992-1LD has been detected with model number 6GK5992-1AM00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5992-1AM00-8AA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP992-1LD; 1x 1000 Mbit/s LC port, optical; single-mode optical up to max of 10 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765100">https://www.tenable.com/plugins/nnm/765100</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP992-1BXMT]]></title>
            <link>https://www.tenable.com/plugins/nnm/765099</link>
            <guid>https://www.tenable.com/plugins/nnm/765099</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765099 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP992-1BXMT has been detected with model number 6GK5992-1AL00-8TA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5992-1AL00-8TA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP992-1BXMT; 1x 1000 Mbit/s LC port, optical; multimode optical up to max of 500 m BiDi Transceiver 1550 nm/1310 nm. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765099">https://www.tenable.com/plugins/nnm/765099</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP992-1BXMR]]></title>
            <link>https://www.tenable.com/plugins/nnm/765098</link>
            <guid>https://www.tenable.com/plugins/nnm/765098</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765098 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP992-1BXMR has been detected with model number 6GK5992-1AL00-8RA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5992-1AL00-8RA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP992-1BXMR; 1x 1000 Mbit/s LC port, optical; multimode optical up to max of 500 m BiDi Receive 1310 nm/1550 nm.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765098">https://www.tenable.com/plugins/nnm/765098</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP992-1+]]></title>
            <link>https://www.tenable.com/plugins/nnm/765097</link>
            <guid>https://www.tenable.com/plugins/nnm/765097</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765097 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP992-1+ has been detected with model number 6GK5992-1AG00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5992-1AG00-8AA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP992-1+; 1x 1000 Mbit/s LC port, optical; multimode optical up to max of 2000 m. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765097">https://www.tenable.com/plugins/nnm/765097</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP991-1LD]]></title>
            <link>https://www.tenable.com/plugins/nnm/765096</link>
            <guid>https://www.tenable.com/plugins/nnm/765096</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765096 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP991-1LD has been detected with model number 6GK5991-1AF00-8FA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5991-1AF00-8FA0 is described by Siemens as SCALANCE X accessory; SFP991-1LD; 1x 100 Mbit/s LC port; with Conformal Coating; optical; Singlemode glass up to max of 26 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765096">https://www.tenable.com/plugins/nnm/765096</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP991-1LD]]></title>
            <link>https://www.tenable.com/plugins/nnm/765095</link>
            <guid>https://www.tenable.com/plugins/nnm/765095</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765095 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP991-1LD has been detected with model number 6GK5991-1AF00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5991-1AF00-8AA0 is described by Siemens as SCALANCE X accessory; SFP991-1LD; 1x 100 Mbit/s LC port, optical; single-mode optical up to max of 26 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765095">https://www.tenable.com/plugins/nnm/765095</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP991-1ELH200]]></title>
            <link>https://www.tenable.com/plugins/nnm/765094</link>
            <guid>https://www.tenable.com/plugins/nnm/765094</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765094 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP991-1ELH200 has been detected with model number 6GK5991-1AE30-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5991-1AE30-8AA0 is described by Siemens as SCALANCE X accessory, Plug-in transceiver SFP991-1ELH200 1x 100 Mbit/s LC port, optical; single-mode glass up to max of 200 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765094">https://www.tenable.com/plugins/nnm/765094</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP991-1]]></title>
            <link>https://www.tenable.com/plugins/nnm/765093</link>
            <guid>https://www.tenable.com/plugins/nnm/765093</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765093 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP991-1 has been detected with model number 6GK5991-1AE00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5991-1AE00-8AA0 is described by Siemens as SCALANCE X accessory, Plug-in transceiver SFP991-1 LH+ 1x 100 Mbit/s LC port, optical; single-mode optical up to max of 70 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765093">https://www.tenable.com/plugins/nnm/765093</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP991-1]]></title>
            <link>https://www.tenable.com/plugins/nnm/765092</link>
            <guid>https://www.tenable.com/plugins/nnm/765092</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765092 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP991-1 has been detected with model number 6GK5991-1AD00-8FA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5991-1AD00-8FA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP991-1 with Conformal Coating; 1x 100 Mbit/s LC port, optical; multimode optical up to max of 5 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765092">https://www.tenable.com/plugins/nnm/765092</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE X Plug-in accessory SFP991-1]]></title>
            <link>https://www.tenable.com/plugins/nnm/765090</link>
            <guid>https://www.tenable.com/plugins/nnm/765090</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765090 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE X Plug-in accessory SFP991-1 has been detected with model number 6GK5991-1AD00-8AA0.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5991-1AD00-8AA0 is described by Siemens as SCALANCE X accessory; Plug-in transceiver SFP991-1; 1x 100 Mbit/s LC port, optical; multimode optical up to max of 5 km. It is part of the STP- and SCP Plug-in transceivers for SCALANCE XM-400 managed family.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765090">https://www.tenable.com/plugins/nnm/765090</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE XM416-4C Managed Modular IE Switch]]></title>
            <link>https://www.tenable.com/plugins/nnm/765089</link>
            <guid>https://www.tenable.com/plugins/nnm/765089</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765089 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE XM416-4C Managed Modular IE Switch has been detected with model number 6GK5416-4GS00-2AM2.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5416-4GS00-2AM2 is described by Siemens as SCALANCE XM416-4C; managed modular IE switch; 16x 10/100/1000 Mbit/s RJ45; 4x 100/1000 Mbit/s SFP; contains 4 combo ports; in total 16 ports can be used; expandable to 24 ports electrical or optical; assembly: DIN rail/S7 mounting rail, PROFINET IO device; redundancy functions; office features (RSTP, VLAN, IGMP); Layer 3 with key plug available.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765089">https://www.tenable.com/plugins/nnm/765089</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Siemens SCALANCE XM416-4C Managed Modular IE Switch]]></title>
            <link>https://www.tenable.com/plugins/nnm/765088</link>
            <guid>https://www.tenable.com/plugins/nnm/765088</guid>
            <pubDate>Thu, 19 Sep 2019 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Network Monitor Plugin ID 765088 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A Siemens SCALANCE XM416-4C Managed Modular IE Switch has been detected with model number 6GK5416-4GR00-2AM2.<br /></span>
      <h3>Description</h3>
      <span>The 6GK5416-4GR00-2AM2 is described by Siemens as SCALANCE XM416-4C; managed modular IE switch; 16x 10/100/1000 Mbit/s RJ45; 4x 100/1000 Mbit/s SFP; contains 4 combo ports; in total 16 ports can be used; expandable to 24 ports electrical or optical; assembly: DIN rail/S7 mounting rail, PROFINET IO device; redundancy functions; office features (RSTP, VLAN, IGMP); Layer 3 integrated.<br /></span>
      <h3>Solution</h3>
      <span>N/A<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nnm/765088">https://www.tenable.com/plugins/nnm/765088</a></p>
    ]]></description>
        </item>
    </channel>
</rss>