<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Updated Nessus Plugins from Tenable</title>
        <link>https://www.tenable.com/plugins/feeds?sort=updated&amp;type=nessus</link>
        <description>Get the latest plugin updates from Tenable</description>
        <lastBuildDate>Tue, 17 Mar 2026 09:39:17 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Tenable Plugins</generator>
        <image>
            <title>Updated Nessus Plugins from Tenable</title>
            <url>https://www.tenable.com/themes/custom/tenable/img/favicons/apple-touch-icon.png</url>
            <link>https://www.tenable.com/plugins/feeds?sort=updated&amp;type=nessus</link>
        </image>
        <copyright>Copyright 2026 Tenable, Inc. All rights reserved.</copyright>
        <atom:link href="https://www.tenable.com/plugins/feeds?sort=updated&amp;type=nessus" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[Unity Linux 20.1070a Security Update: binutils (UTSA-2026-006200)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302362</link>
            <guid>https://www.tenable.com/plugins/nessus/302362</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302362 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006200 advisory.<br /></span><span><br /></span><span>    A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by     this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to     out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed     to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is     recommended to apply a patch to fix this issue.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected binutils package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302362">https://www.tenable.com/plugins/nessus/302362</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070a Security Update: binutils (UTSA-2026-006196)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302356</link>
            <guid>https://www.tenable.com/plugins/nessus/302356</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302356 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006196 advisory.<br /></span><span><br /></span><span>    A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability     is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer     overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be     used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to     fix this issue.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected binutils package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302356">https://www.tenable.com/plugins/nessus/302356</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : wireshark (2026-a92f2096cd)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302349</link>
            <guid>https://www.tenable.com/plugins/nessus/302349</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302349 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-a92f2096cd advisory.<br /></span><span><br /></span><span>    New version 4.6.4<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected 1:wireshark package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302349">https://www.tenable.com/plugins/nessus/302349</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : wireshark (2026-f7473d3da8)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302346</link>
            <guid>https://www.tenable.com/plugins/nessus/302346</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302346 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-f7473d3da8 advisory.<br /></span><span><br /></span><span>    New version 4.6.4<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected 1:wireshark package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302346">https://www.tenable.com/plugins/nessus/302346</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : pcs (2026-88c901f6a2)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302338</link>
            <guid>https://www.tenable.com/plugins/nessus/302338</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302338 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-88c901f6a2 advisory.<br /></span><span><br /></span><span>    - Rebased pcs to the newest major version (see CHANGELOG.md)<br /></span><span>    - Updated standalone web UI and HA Cluster Management Cockpit application to pcs-web-ui 0.1.24.2 (see     CHANGELOG_WUI.md)<br /></span><span>    - Fixed FTBFS with Python 3.15<br /></span><span>    - Fixed issues with installing pcs on Fedora 43+, upgrade and uninstall<br /></span><span><br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected pcs package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302338">https://www.tenable.com/plugins/nessus/302338</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : insight (2026-0106837085)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302337</link>
            <guid>https://www.tenable.com/plugins/nessus/302337</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302337 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-0106837085 advisory.<br /></span><span><br /></span><span>    New upstream snapshot.<br /></span><span>    Fixes CVEs 2025-11494, 2025-11495, 2026-2341, 2026-3441, 2026-3442.<br /></span><span>    Fixes CVEs 2025-69644, 2025-69645, 2025-69646.<br /></span><span>    Fixes FTBFS.<br /></span><span>    Relax BR of itcl/itk/iwidgets.<br /></span><span>    Patch libtool_tag to force C++ language tagging in libtool.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected insight package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302337">https://www.tenable.com/plugins/nessus/302337</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : pcs (2026-c8dc2c0de3)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302336</link>
            <guid>https://www.tenable.com/plugins/nessus/302336</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302336 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-c8dc2c0de3 advisory.<br /></span><span><br /></span><span>    - Rebased pcs to the newest major version (see CHANGELOG.md)<br /></span><span>    - Updated standalone web UI and HA Cluster Management Cockpit application to pcs-web-ui 0.1.24.2 (see     CHANGELOG_WUI.md)<br /></span><span>    - Fixed FTBFS with Python 3.15<br /></span><span>    - Fixed issues with installing pcs on Fedora 43+, upgrade and uninstall<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected pcs package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302336">https://www.tenable.com/plugins/nessus/302336</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : insight (2026-8af0e7ea3e)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302335</link>
            <guid>https://www.tenable.com/plugins/nessus/302335</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302335 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-8af0e7ea3e advisory.<br /></span><span><br /></span><span>    New upstream snapshot.<br /></span><span>    Fixes CVEs 2025-11494, 2025-11495, 2026-2341, 2026-3441, 2026-3442.<br /></span><span>    Fixes CVEs 2025-69644, 2025-69645, 2025-69646.<br /></span><span>    Fixes FTBFS.<br /></span><span>    Relax BR of itcl/itk/iwidgets.<br /></span><span>    Patch libtool_tag to force C++ language tagging in libtool.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected insight package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302335">https://www.tenable.com/plugins/nessus/302335</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : systemd (2026-0e8eeb6a8a)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302334</link>
            <guid>https://www.tenable.com/plugins/nessus/302334</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302334 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by a vulnerability as referenced in the FEDORA-2026-0e8eeb6a8a advisory.<br /></span><span><br /></span><span>    - A bunch of bugfixes<br /></span><span>    - More sanitization for invalid values received from hardware and firmware<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected systemd package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302334">https://www.tenable.com/plugins/nessus/302334</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: assimp (UTSA-2026-006192)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302325</link>
            <guid>https://www.tenable.com/plugins/nessus/302325</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302325 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006192 advisory.<br /></span><span><br /></span><span>    A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3.<br /></span><span>    Affected is the function Assimp::MD3Importer::ValidateSurfaceHeaderOffsets of the file     code/AssetLib/MD3/MD3Loader.cpp of the component File Handler. The manipulation leads to heap-based buffer     overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may     be used.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected assimp package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302325">https://www.tenable.com/plugins/nessus/302325</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: assimp (UTSA-2026-006180)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302317</link>
            <guid>https://www.tenable.com/plugins/nessus/302317</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302317 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006180 advisory.<br /></span><span><br /></span><span>    A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as problematic.<br /></span><span>    Affected by this issue is the function MDLImporter::ImportUVCoordinate_3DGS_MDL345 of the file     assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation of the argument iIndex leads to out-of-bounds     read. An attack has to be approached locally. The exploit has been disclosed to the public and may be     used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected assimp package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302317">https://www.tenable.com/plugins/nessus/302317</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: assimp (UTSA-2026-006193)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302303</link>
            <guid>https://www.tenable.com/plugins/nessus/302303</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302303 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006193 advisory.<br /></span><span><br /></span><span>    A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as     problematic. Affected is the function MDCImporter::InternReadFile of the file     assimp/code/AssetLib/MDC/MDCLoader.cpp of the component MDC File Parser. The manipulation of the argument     pcVerts leads to out-of-bounds read. It is possible to launch the attack on the local host. The exploit     has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a     main-issue to address them in the future.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected assimp package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302303">https://www.tenable.com/plugins/nessus/302303</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: assimp (UTSA-2026-006186)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302298</link>
            <guid>https://www.tenable.com/plugins/nessus/302298</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302298 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006186 advisory.<br /></span><span><br /></span><span>    A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This     vulnerability affects the function Assimp::GetNextLine in the library ParsingUtils.h of the component File     Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The     exploit has been disclosed to the public and may be used.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected assimp package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302298">https://www.tenable.com/plugins/nessus/302298</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: autogen (UTSA-2026-006166)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302285</link>
            <guid>https://www.tenable.com/plugins/nessus/302285</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302285 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006166 advisory.<br /></span><span><br /></span><span>    A vulnerability, which was classified as problematic, was found in GNU libopts up to 27.6. Affected is the     function __strstr_sse2. The manipulation leads to memory corruption. Local access is required to approach     this attack. The exploit has been disclosed to the public and may be used. This issue was initially     reported to the tcpreplay project, but the code maintainer explains, that this bug appears to be in     libopts which is an external library. This vulnerability only affects products that are no longer     supported by the maintainer.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected autogen package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302285">https://www.tenable.com/plugins/nessus/302285</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: assimp (UTSA-2026-006188)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302281</link>
            <guid>https://www.tenable.com/plugins/nessus/302281</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302281 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006188 advisory.<br /></span><span><br /></span><span>    A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This     issue affects the function MDCImporter::ValidateSurfaceHeader of the file     assimp/code/AssetLib/MDC/MDCLoader.cpp. The manipulation of the argument pcSurface2 leads to out-of-bounds     read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.<br /></span><span>    The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected assimp package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302281">https://www.tenable.com/plugins/nessus/302281</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1070e Security Update: vim (UTSA-2026-006175)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302278</link>
            <guid>https://www.tenable.com/plugins/nessus/302278</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302278 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006175 advisory.<br /></span><span><br /></span><span>    A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects     unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It     is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this     issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade     the affected component.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected vim package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302278">https://www.tenable.com/plugins/nessus/302278</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3082]]></title>
            <link>https://www.tenable.com/plugins/nessus/302271</link>
            <guid>https://www.tenable.com/plugins/nessus/302271</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302271 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with     this library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the processing of Huffman tables. The issue results from     the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length     heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the     current process. Was ZDI-CAN-28840. (CVE-2026-3082)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302271">https://www.tenable.com/plugins/nessus/302271</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31899]]></title>
            <link>https://www.tenable.com/plugins/nessus/302268</link>
            <guid>https://www.tenable.com/plugins/nessus/302268</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302268 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to Kozea/CairoSVG has     exponential denial of service via recursive <use> element amplification in cairosvg/defs.py. This causes     CPU exhaustion from a small input. (CVE-2026-31899)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302268">https://www.tenable.com/plugins/nessus/302268</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLED15 / SLES15 / openSUSE 15 Security Update : libsoup (SUSE-SU-2026:0894-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302258</link>
            <guid>https://www.tenable.com/plugins/nessus/302258</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302258 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2026:0894-1 advisory.<br /></span><span><br /></span><span>    This update for libsoup fixes the following issue:<br /></span><span><br /></span><span>    - CVE-2026-0716: improper bounds handling may allow out-of-bounds read (bsc#1256418).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302258">https://www.tenable.com/plugins/nessus/302258</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 146.0.7680.80 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nessus/302242</link>
            <guid>https://www.tenable.com/plugins/nessus/302242</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302242 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote macOS host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote macOS host is prior to 146.0.7680.80. It is, therefore, affected by a vulnerability as referenced in the 2026_03_stable-channel-update-for-desktop_13 advisory.<br /></span><span><br /></span><span>  - Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform     out of bounds memory access via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3909)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 146.0.7680.80 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302242">https://www.tenable.com/plugins/nessus/302242</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 146.0.7680.80 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nessus/302241</link>
            <guid>https://www.tenable.com/plugins/nessus/302241</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302241 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote Windows host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote Windows host is prior to 146.0.7680.80. It is, therefore, affected by a vulnerability as referenced in the 2026_03_stable-channel-update-for-desktop_13 advisory.<br /></span><span><br /></span><span>  - Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform     out of bounds memory access via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3909)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 146.0.7680.80 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302241">https://www.tenable.com/plugins/nessus/302241</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3979]]></title>
            <link>https://www.tenable.com/plugins/nessus/302202</link>
            <guid>https://www.tenable.com/plugins/nessus/302202</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302202 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A flaw has been found in quickjs-ng quickjs up to 0.12.1. This affects the function     js_iterator_concat_return of the file quickjs.c. This manipulation causes use after free. The attack     requires local access. The exploit has been published and may be used. Patch name:<br /></span><span>    daab4ad4bae4ef071ed0294618d6244e92def4cd. Applying a patch is the recommended action to fix this issue.<br /></span><span>    (CVE-2026-3979)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302202">https://www.tenable.com/plugins/nessus/302202</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3884]]></title>
            <link>https://www.tenable.com/plugins/nessus/302200</link>
            <guid>https://www.tenable.com/plugins/nessus/302200</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302200 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Versions of the package spin.js before 3.0.0 are vulnerable to Cross-site Scripting (XSS) via the spin()     function that allows a creation of more than 1 alert for each 'target' element. An attacker would need to     set an arbitrary key-value pair on Object.prototype through a crafted URL achieving a prototype pollution     first, before being able to execute arbitrary JavaScript in the context of the user's browser.<br /></span><span>    (CVE-2026-3884)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302200">https://www.tenable.com/plugins/nessus/302200</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco Secure Endpoint ClamAV CSS Parsing DoS (cisco-sa-clamav-css-Fn4QSZ)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302191</link>
            <guid>https://www.tenable.com/plugins/nessus/302191</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302191 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is missing a vendor-supplied security patch.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, Cisco Secure Endpoint is affected by a denial of service (DoS) vulnerability.<br /></span><span><br /></span><span>  - A vulnerability in the HTML Cascading Style Sheets (CSS) module of ClamAV could allow an     unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected     device. This vulnerability is due to improper error handling when splitting UTF-8 strings. An     attacker could exploit this vulnerability by submitting a crafted HTML file to be scanned by     ClamAV on an affected device. A successful exploit could allow the attacker to terminate the     scanning process. (CVE-2026-20031)<br /></span><span><br /></span><span>Please see the included Cisco BIDs and Cisco Security Advisory for more information.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwr70252, CSCwr70255, CSCwr70268.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302191">https://www.tenable.com/plugins/nessus/302191</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco IOS XR Software CLI Privilege Escalation (cisco-sa-iosxr-privesc-bF8D5U4W)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302176</link>
            <guid>https://www.tenable.com/plugins/nessus/302176</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302176 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is missing a vendor-supplied security patch<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, Cisco IOS XR is affected by a vulnerability.<br /></span><span><br /></span><span>  - A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local     attacker to execute arbitrary commands as root on the underlying operating system of an     affected device. This vulnerability is due to insufficient validation of user arguments that     are passed to specific CLI commands. An attacker with a low-privileged account could exploit     this vulnerability by using crafted commands at the prompt. A successful exploit could allow     the attacker to elevate privileges to root and execute arbitrary commands. (CVE-2026-20040)<br /></span><span><br /></span><span>Please see the included Cisco BIDs and Cisco Security Advisory for more information.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwp27221, CSCwp30135, CSCwp30142, CSCwp30146, CSCwp30149, CSCwp32614, CSCwp32629, CSCwp33021, CSCwp33030, CSCwp33034, CSCwp35627, CSCwp84685, CSCws24696, CSCws24717, CSCws24740<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302176">https://www.tenable.com/plugins/nessus/302176</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco IOS XR Software CLI Privilege Escalation (cisco-sa-iosxr-privesc-bF8D5U4W) (CVE-2026-20046)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302175</link>
            <guid>https://www.tenable.com/plugins/nessus/302175</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302175 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is missing a vendor-supplied security patch<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, Cisco IOS XR is affected by a vulnerability.<br /></span><span><br /></span><span>  - A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software     could allow an authenticated, local attacker to elevate privileges and gain full     administrative control of an affected device. This vulnerability is due to incorrect mapping     of a command to task groups within the source code. An attacker with a low-privileged account     could exploit this vulnerability by using the CLI command to bypass the task group-based     checks. A successful exploit could allow the attacker to elevate privileges and perform     actions on an affected device without authorization checks. (CVE-2026-20046)<br /></span><span><br /></span><span>Please see the included Cisco BIDs and Cisco Security Advisory for more information.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwp87543<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302175">https://www.tenable.com/plugins/nessus/302175</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco Secure Firewall Management Center Software Authentication Bypass (cisco-sa-onprem-fmc-authbypass-5JPp45V2)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302174</link>
            <guid>https://www.tenable.com/plugins/nessus/302174</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302174 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is missing a vendor-supplied security patch.<br /></span>
      <h3>Description</h3>
      <span>A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system. This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwr96008.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302174">https://www.tenable.com/plugins/nessus/302174</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-70873]]></title>
            <link>https://www.tenable.com/plugins/nessus/302173</link>
            <guid>https://www.tenable.com/plugins/nessus/302173</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302173 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1     and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file. (CVE-2025-70873)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302173">https://www.tenable.com/plugins/nessus/302173</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3910]]></title>
            <link>https://www.tenable.com/plugins/nessus/302169</link>
            <guid>https://www.tenable.com/plugins/nessus/302169</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302169 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to     execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)     (CVE-2026-3910)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302169">https://www.tenable.com/plugins/nessus/302169</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3909]]></title>
            <link>https://www.tenable.com/plugins/nessus/302167</link>
            <guid>https://www.tenable.com/plugins/nessus/302167</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302167 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform     out of bounds memory access via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3909)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302167">https://www.tenable.com/plugins/nessus/302167</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft System Center Operations Manager (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302166</link>
            <guid>https://www.tenable.com/plugins/nessus/302166</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302166 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web application hosted on the remote Windows system is affected by an elevation of privilege vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Microsoft System Center Operations Manager installed on the remote Windows host is affected by an elevation of privilege vulnerability. A remote, authenticated attacker can exploit this vulnerability by sending a specially crafted request to an affected SCOM instance.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released a set of patches for System Center Operations Manager 2019, 2022, and 2025.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302166">https://www.tenable.com/plugins/nessus/302166</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SAP NetWeaver AS ABAP Missing Authorization Check (3703856)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302165</link>
            <guid>https://www.tenable.com/plugins/nessus/302165</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302165 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SAP NetWeaver ABAP server is affected by a missing authorization check vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of SAP NetWeaver AS ABAP and ABAP Platform detected on the remote host is affected by a missing authorization check vulnerability as referenced in the SAP Security Patch Day March 2026:<br /></span><span><br /></span><span>  - Due to missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated     attacker could execute specific ABAP function module to read, modify or insert entries into the database     configuration table of the ABAP system. This unauthorized content change could lead to reduced system     performance or interruptions. The vulnerability has low impact on the application's integrity and     availability, with no effect on confidentiality. (CVE-2026-24309)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply the appropriate patch according to the vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302165">https://www.tenable.com/plugins/nessus/302165</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SAP NetWeaver AS ABAP SSRF (3689080)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302164</link>
            <guid>https://www.tenable.com/plugins/nessus/302164</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302164 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SAP NetWeaver ABAP server is affected by a server-side request forgery (SSRF) vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of SAP NetWeaver AS ABAP and ABAP Platform detected on the remote host is affected by a server-side request forgery (SSRF) vulnerability as referenced in the SAP Security Patch Day March 2026:<br /></span><span><br /></span><span>  - SAP NetWeaver Application Server for ABAP provides an ABAP Report for testing purposes, which allows to     send HTTP requests to arbitrary internal or external endpoints. The report is therefore vulnerable to     Server-Side Request Forgery (SSRF). Successful exploitation could lead to interaction with potentially     sensitive internal endpoints, resulting in a low impact on data confidentiality and integrity. There is     no impact on availability of the application. (CVE-2026-24316)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply the appropriate patch according to the vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302164">https://www.tenable.com/plugins/nessus/302164</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SAP NetWeaver AS ABAP Missing Authorization Check (3704740)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302163</link>
            <guid>https://www.tenable.com/plugins/nessus/302163</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302163 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SAP NetWeaver ABAP server is affected by a missing authorization check vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of SAP NetWeaver AS ABAP and ABAP Platform detected on the remote host is affected by a missing authorization check vulnerability as referenced in the SAP Security Patch Day March 2026:<br /></span><span><br /></span><span>  - Due to a missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated     attacker with user privileges could read Database Analyzer Log Files via a specific RFC function module.     The attacker with the necessary privileges to execute this function module could potentially escalate     their privileges and read the sensitive data, resulting in a limited impact on the confidentiality of the     information stored. However, the integrity and availability of the system are not affected.     (CVE-2026-27688)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply the appropriate patch according to the vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302163">https://www.tenable.com/plugins/nessus/302163</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SAP NetWeaver AS ABAP Missing Authorization Check (3694383)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302162</link>
            <guid>https://www.tenable.com/plugins/nessus/302162</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302162 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SAP NetWeaver ABAP server is affected by a missing authorization check vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of SAP NetWeaver AS ABAP and ABAP Platform detected on the remote host is affected by a missing authorization check vulnerability as referenced in the SAP Security Patch Day March 2026:<br /></span><span><br /></span><span>  - Due to missing authorization check in SAP NetWeaver Application Server for ABAP, an authenticated     attacker could execute specific ABAP function module and read the sensitive information from database     catalog of the ABAP system. This vulnerability has low impact on the application's confidentiality with     no effect on the integrity and availability. (CVE-2026-24310)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply the appropriate patch according to the vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302162">https://www.tenable.com/plugins/nessus/302162</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco Unified Intelligence Center XSS (cisco-sa-cc-xss-MrNAH5Jh)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302161</link>
            <guid>https://www.tenable.com/plugins/nessus/302161</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302161 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a vendor-supplied security patch.<br /></span>
      <h3>Description</h3>
      <span>A vulnerability in the web-based management interface of Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwq50557.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302161">https://www.tenable.com/plugins/nessus/302161</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco Finesse XSS (cisco-sa-cc-xss-MrNAH5Jh)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302160</link>
            <guid>https://www.tenable.com/plugins/nessus/302160</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302160 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a vendor-supplied security patch.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, Cisco Finesse is affected by a cross-site scripting vulnerability in the web-based management interface due to insufficient validation of user-supplied input. An unauthenticated, remote attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive browser-based information.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug ID CSCws01830.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302160">https://www.tenable.com/plugins/nessus/302160</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4111]]></title>
            <link>https://www.tenable.com/plugins/nessus/302158</link>
            <guid>https://www.tenable.com/plugins/nessus/302158</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302158 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically     within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the     decompression routine may enter a state where internal logic prevents forward progress. This condition     results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum     validation and appears structurally valid, affected applications cannot detect the issue before     processing. This can allow attackers to cause persistent denial-of-service conditions in services that     automatically process archives. (CVE-2026-4111)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302158">https://www.tenable.com/plugins/nessus/302158</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4105]]></title>
            <link>https://www.tenable.com/plugins/nessus/302156</link>
            <guid>https://www.tenable.com/plugins/nessus/302156</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302156 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A flaw was found in systemd. The systemd-machined service contains an Improper Access Control     vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop     Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a     specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the     attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with     root privileges on the host system. (CVE-2026-4105)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302156">https://www.tenable.com/plugins/nessus/302156</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4016]]></title>
            <link>https://www.tenable.com/plugins/nessus/302155</link>
            <guid>https://www.tenable.com/plugins/nessus/302155</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302155 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A security vulnerability has been detected in GPAC 26.03-DEV. Affected by this vulnerability is the     function svgin_process of the file src/filters/load_svg.c of the component SVG Parser. The manipulation     leads to out-of-bounds write. Local access is required to approach this attack. The exploit has been     disclosed publicly and may be used. The identifier of the patch is     7618d7206cdeb3c28961dc97ab0ecabaff0c8af2. It is suggested to install a patch to address this issue.<br /></span><span>    (CVE-2026-4016)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302155">https://www.tenable.com/plugins/nessus/302155</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-4015]]></title>
            <link>https://www.tenable.com/plugins/nessus/302154</link>
            <guid>https://www.tenable.com/plugins/nessus/302154</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302154 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A weakness has been identified in GPAC 26.03-DEV. Affected is the function txtin_process_texml of the file     src/filters/load_text.c of the component TeXML File Parser. Executing a manipulation can lead to stack-     based buffer overflow. It is possible to launch the attack on the local host. The exploit has been made     available to the public and could be used for attacks. This patch is called     d29f6f1ada5cc284cdfa783b6f532c7d8bd049a5. Applying a patch is advised to resolve this issue.<br /></span><span>    (CVE-2026-4015)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302154">https://www.tenable.com/plugins/nessus/302154</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ImageMagick < 6.9.13-41 / 7.x < 7.1.2-16 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/302153</link>
            <guid>https://www.tenable.com/plugins/nessus/302153</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302153 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host has an application installed that is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host has a version of ImageMagick installed that is prior to 6.9.13-41 and 7.x prior to 7.1.2-16. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, domain='path' authorization is checked before final file open/use. A     symlink swap between check-time and use-time bypasses policy-denied read/write. (CVE-2026-28689)<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization     resulting in a heap over-read. (CVE-2026-28692)<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when     encoding a PNG image. (CVE-2026-30883)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to ImageMagick version 6.9.13-41 / 7.1.2-16 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302153">https://www.tenable.com/plugins/nessus/302153</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Windows Admin Center Local Privilege Escalation (February 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302151</link>
            <guid>https://www.tenable.com/plugins/nessus/302151</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302151 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host contains an application that is affected by a local privilege escalation vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is running a version of Microsoft Windows Admin Center that is missing a security update. It is, therefore, affected by a local privilege escalation vulnerability. Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network. (CVE-2026-26119)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply the appropriate update referenced in the Microsoft advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302151">https://www.tenable.com/plugins/nessus/302151</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ivanti Desktop and Server Management (DSM) < 2026.1.1 Privilege Escalation (CVE-2026-3483)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302138</link>
            <guid>https://www.tenable.com/plugins/nessus/302138</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302138 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Ivanti Desktop and Server Management (DSM) installed on the remote host is prior to 2026.1.1. It is, therefore, affected by a Privilege Escalation Vulnerability.<br /></span><span><br /></span><span>  - An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker     to escalate their privileges. (CVE-2026-3483)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Ivanti DSM version 2026.1.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302138">https://www.tenable.com/plugins/nessus/302138</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Experience Manager 6.5.x < 6.5.24 / 6.5 LTS SP1 Multiple Vulnerabilities (APSB26-24)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302135</link>
            <guid>https://www.tenable.com/plugins/nessus/302135</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302135 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Adobe Experience Manager instance installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Experience Manager installed on the remote host is prior to 6.5.24. It is, therefore, affected by multiple vulnerabilities as referenced in the APSB26-24 advisory.<br /></span><span><br /></span><span>  - Adobe Experience Manager versions 6.5.23 and earlier are affected by a stored Cross-Site Scripting (XSS)   vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields.   Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the   vulnerable field.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>See vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302135">https://www.tenable.com/plugins/nessus/302135</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060e / 20.1070e Security Update: erlang (UTSA-2026-006131)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302133</link>
            <guid>https://www.tenable.com/plugins/nessus/302133</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302133 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-006131 advisory.<br /></span><span><br /></span><span>    Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3,     OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote     code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain     unauthorized access to affected systems and execute arbitrary commands without valid credentials. This     issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves     disabling the SSH server or to prevent access via firewall rules.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected erlang package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302133">https://www.tenable.com/plugins/nessus/302133</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Update for Microsoft .NET Core (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302122</link>
            <guid>https://www.tenable.com/plugins/nessus/302122</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302122 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of tested product installed on the remote host is 8.x prior to 8.0.25, 9.x prior to 9.0.14, or 10.x prior to 10.0.4. It is, therefore, affected by multiple vulnerabilities as referenced in the vendor advisory:<br /></span><span><br /></span><span>  - Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network. (CVE-2026-26127)<br /></span><span><br /></span><span>  - Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to     deny service over a network. (CVE-2026-26130)<br /></span><span><br /></span><span>  - Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-26131)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update .NET Core, remove vulnerable packages and refer to vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302122">https://www.tenable.com/plugins/nessus/302122</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Update for Microsoft .NET Core SDK (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302121</link>
            <guid>https://www.tenable.com/plugins/nessus/302121</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302121 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of .NET Core SDK installed on the remote host is 8.x prior to 8.0.125, 8.0.4xx prior to 8.0.419, 9.x prior to 9.0.115, 9.0.3xx prior to 9.312, or 10.x prior to 10.0.104. It is, therefore, affected by multiple vulnerabilities as referenced in the vendor advisory:<br /></span><span><br /></span><span>  - Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network. (CVE-2026-26127)<br /></span><span><br /></span><span>  - Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to     deny service over a network. (CVE-2026-26130)<br /></span><span><br /></span><span>  - Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-26131)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version nuber.<br /></span>
      <h3>Solution</h3>
      <span>Update .NET Core SDK, remove vulnerable packages and refer to the vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302121">https://www.tenable.com/plugins/nessus/302121</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zoom Rooms < 6.6.5 Improper Input Validation (ZSB-26003)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302114</link>
            <guid>https://www.tenable.com/plugins/nessus/302114</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302114 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an application installed that is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Zoom Rooms installed on the remote host is prior to 6.6.5. It is, therefore, affected by a vulnerability as referenced in the ZSB-26003 advisory.<br /></span><span><br /></span><span>  - Improper Input Validation in Zoom Rooms for Windows before 6.6.5 in Kiosk Mode may allow an     authenticated user to conduct an escalation of privilege via local access. (CVE-2026-30901)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zoom Rooms 6.6.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302114">https://www.tenable.com/plugins/nessus/302114</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SAP NetWeaver AS Java Multiple Vulnerabilities (3700960)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302113</link>
            <guid>https://www.tenable.com/plugins/nessus/302113</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302113 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SAP NetWeaver AS Java server is affected by a multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of SAP NetWeaver Application Server Java detected on the remote host is affected by a affected by a multiple vulnerabilities as disclosed in the SAP Security Patch Day March 2026:<br /></span><span><br /></span><span>  - An application trying to decrypt CMS messages encrypted using password based encryption can trigger an     out-of-bounds read and write. This out-of-bounds read may trigger a crash which leads to Denial of     Service for an application. The out-of-bounds write can cause a memory corruption which can have various     consequences including a Denial of Service or Execution of attacker-supplied code. Although the     consequences of a successful exploit of this vulnerability could be severe, the probability that the     attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS     messages is very rarely used. (CVE-2025-9230)<br /></span><span><br /></span><span>  - An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the     'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is     an IPv6 address. An out-of-bounds read can trigger a crash which leads to Denial of Service for an     application. The OpenSSL HTTP client API functions can be used directly by applications but they are also     used by the OCSP client functions and CMP (Certificate Management Protocol) client implementation in     OpenSSL. However the URLs used by these implementations are unlikely to be controlled by an attacker. In     this vulnerable code the out of bounds read can only trigger a crash. Furthermore the vulnerability     requires an attacker-controlled URL to be passed from an application to the OpenSSL function and the user     has to have a 'no_proxy' environment variable set. (CVE-2025-9232)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply the appropriate patch according to the vendor advisory.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302113">https://www.tenable.com/plugins/nessus/302113</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLED15 / SLES15 / openSUSE 15 Security Update : libsoup2 (SUSE-SU-2026:0886-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302107</link>
            <guid>https://www.tenable.com/plugins/nessus/302107</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302107 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2026:0886-1 advisory.<br /></span><span><br /></span><span>    This update for libsoup2 fixes the following issue:<br /></span><span><br /></span><span>    - CVE-2026-0716: improper bounds handling may allow out-of-bounds read (bsc#1256418).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302107">https://www.tenable.com/plugins/nessus/302107</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[TencentOS Server 3: nodejs:20 (TSSA-2026:0171)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302074</link>
            <guid>https://www.tenable.com/plugins/nessus/302074</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302074 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote TencentOS Server 3 host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2026:0171 advisory.<br /></span><span><br /></span><span>    Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:<br /></span><span><br /></span><span>    CVE-2025-55130:<br /></span><span>    A flaw in Node.jss Permissions model allows attackers to bypass --allow-fs-read and --allow-fs-write     restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted     access only to the current directory can escape the allowed path and read sensitive files. This breaks the     expected isolation guarantees and enables arbitrary file read/write, leading to potential system     compromise.<br /></span><span>    This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.<br /></span><span><br /></span><span>    CVE-2025-55131:<br /></span><span>    A flaw in Node.js's buffer allocation logic can expose uninitialized memory when allocations are     interrupted, when using the vm module with the timeout option. Under specific timing conditions, buffers     allocated with Buffer.alloc and other TypedArray instances like Uint8Array may contain leftover data from     previous operations, allowing in-process secrets like tokens or passwords to leak or causing data     corruption. While exploitation typically requires precise timing or in-process code execution, it can     become remotely exploitable when untrusted input influences workload and timeouts, leading to potential     confidentiality and integrity impact.<br /></span><span><br /></span><span>    CVE-2025-55132:<br /></span><span>    A flaw in Node.js's permission model allows a file's access and modification timestamps to be changed via     futimes() even when the process has only read permissions. Unlike utimes(), futimes() does not apply the     expected write-permission checks, which means file metadata can be modified in read-only directories. This     behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of     logs. This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.<br /></span><span><br /></span><span>    CVE-2025-59465:<br /></span><span>    A malformed HTTP/2 HEADERS frame with oversized, invalid HPACK data can cause Node.js to crash by     triggering an unhandled TLSSocket error ECONNRESET. Instead of safely closing the connection, the process     crashes, enabling a remote denial of service. This primarily affects applications that do not attach     explicit error handlers to secure sockets, for example:<br /></span><span><br /></span><span>    server.on('secureConnection', socket => {     socket.on('error', err => {       console.log(err)     })     })<br /></span><span><br /></span><span><br /></span><span>    CVE-2025-59466:<br /></span><span>    We have identified a bug in Node.js error handling where Maximum call stack size exceeded errors become     uncatchable when async_hooks.createHook() is enabled. Instead of reaching process.on('uncaughtException'),     the process terminates, making the crash unrecoverable. Applications that rely on AsyncLocalStorage (v22,     v20) or async_hooks.createHook() (v24, v22, v20) become vulnerable to denial-of-service crashes triggered     by deep recursion under specific conditions.<br /></span><span><br /></span><span>    CVE-2026-21637:<br /></span><span>    A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server     when pskCallback or ALPNCallback are in use. Synchronous exceptions thrown during these callbacks bypass     standard TLS error handling paths (tlsClientError and error), causing either immediate process termination     or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process     attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This     vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these     callbacks throw without being safely wrapped.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302074">https://www.tenable.com/plugins/nessus/302074</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3950]]></title>
            <link>https://www.tenable.com/plugins/nessus/302001</link>
            <guid>https://www.tenable.com/plugins/nessus/302001</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302001 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability was identified in strukturag libheif up to 1.21.2. This impacts the function Track::load     of the file libheif/sequences/track.cc of the component stsz/stts. The manipulation leads to out-of-bounds     read. The attack needs to be performed locally. The exploit is publicly available and might be used.<br /></span><span>    Applying a patch is the recommended action to fix this issue. The patch available is inofficial and not     approved yet. (CVE-2026-3950)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302001">https://www.tenable.com/plugins/nessus/302001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3949]]></title>
            <link>https://www.tenable.com/plugins/nessus/302000</link>
            <guid>https://www.tenable.com/plugins/nessus/302000</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302000 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability was determined in strukturag libheif up to 1.21.2. This affects the function     vvdec_push_data2 of the file libheif/plugins/decoder_vvdec.cc of the component HEIF File Parser. Executing     a manipulation of the argument size can lead to out-of-bounds read. The attack needs to be launched     locally. The exploit has been publicly disclosed and may be utilized. This patch is called     b97c8b5f198b27f375127cd597a35f2113544d03. It is advisable to implement a patch to correct this issue.<br /></span><span>    (CVE-2026-3949)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302000">https://www.tenable.com/plugins/nessus/302000</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft SQL Server (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301981</link>
            <guid>https://www.tenable.com/plugins/nessus/301981</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301981 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft SQL Server installation on the remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft SQL Server installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerabilities:<br /></span><span><br /></span><span>  - A privilege escalation vulnerability     (CVE-2026-21262, CVE-2026-26115, CVE-2026-26116)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released security updates for Microsoft SQL Server.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301981">https://www.tenable.com/plugins/nessus/301981</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft SQL Server (March 2026) (Remote)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301980</link>
            <guid>https://www.tenable.com/plugins/nessus/301980</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301980 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft SQL Server installation on the remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft SQL Server installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerabilities:<br /></span><span><br /></span><span>  - A privilege escalation vulnerability     (CVE-2026-21262, CVE-2026-26115, CVE-2026-26116)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released security updates for Microsoft SQL Server.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301980">https://www.tenable.com/plugins/nessus/301980</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3994]]></title>
            <link>https://www.tenable.com/plugins/nessus/301960</link>
            <guid>https://www.tenable.com/plugins/nessus/301960</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301960 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability was detected in rui314 mold up to 2.40.4. This issue affects the function     mold::ObjectFilemold::X86_64::initialize_sections of the file src/input-files.cc of the component Object     File Handler. Performing a manipulation results in heap-based buffer overflow. Attacking locally is a     requirement. The exploit is now public and may be used. The project was informed of the problem early     through an issue report but has not responded yet. (CVE-2026-3994)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301960">https://www.tenable.com/plugins/nessus/301960</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Slackware Linux 15.0 / current libxml2  Multiple Vulnerabilities (SSA:2026-070-02)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301909</link>
            <guid>https://www.tenable.com/plugins/nessus/301909</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301909 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Slackware Linux host is missing a security update to libxml2.<br /></span>
      <h3>Description</h3>
      <span>The version of libxml2 installed on the remote host is prior to 2.11.9 / 2.15.2. It is, therefore, affected by multiple vulnerabilities as referenced in the SSA:2026-070-02 advisory.<br /></span><span><br /></span><span>    New libxml2 packages are available for Slackware 15.0 and -current to fix security issues.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the libxml2 security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the affected libxml2 package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301909">https://www.tenable.com/plugins/nessus/301909</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : Gitlab -- vulnerabilities (0236eab0-1d62-11f1-88f8-2cf05da270f3)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301881</link>
            <guid>https://www.tenable.com/plugins/nessus/301881</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301881 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 0236eab0-1d62-11f1-88f8-2cf05da270f3 advisory.<br /></span><span><br /></span><span>    Gitlab reports:<br /></span><span>    Cross-site Scripting issue in Markdown placeholder processing impacts GitLab CE/EE     Denial of Service issue in GraphQL API impacts GitLab CE/EE     Denial of Service issue in repository archive endpoint impacts GitLab CE/EE     Denial of Service issue in protected branches API impacts GitLab CE/EE     Denial of Service issue in webhook custom headers impacts GitLab CE/EE     Denial of Service issue in webhook endpoint impacts GitLab CE/EE     Improper Neutralization of CRLF Sequences issue impacts GitLab CE/EE     Improper Access Control issue in runners API impacts GitLab CE/EE     Improper Access Control issue in snippet rendering impacts GitLab CE/EE     Information Disclosure issue in inaccessible issues impacts GitLab CE/EE     Missing Authorization issue in Group Import impacts GitLab CE/EE     Incorrect Reference issue in repository download impacts GitLab CE/EE     Incorrect Authorization issue in Virtual Registry impacts GitLab EE     Improper Escaping of Output issue in Datadog integration impacts GitLab CE/EE<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301881">https://www.tenable.com/plugins/nessus/301881</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GitLab 10.6 < 18.7.6 / 18.8 < 18.8.6 / 18.9 < 18.9.2 (CVE-2026-1090)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301878</link>
            <guid>https://www.tenable.com/plugins/nessus/301878</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301878 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability, as follows:<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before     18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the     `markdown_placeholders` feature flag was enabled, to inject JavaScript in a browser due to improper     sanitization of placeholder content in markdown processing. (CVE-2026-1090)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GitLab version 18.7.6, 18.8.6, 18.9.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301878">https://www.tenable.com/plugins/nessus/301878</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Splunk Enterprise 9.3.0 < 9.3.10, 9.4.0 < 9.4.9, 10.0.0 < 10.0.3 (SVD-2026-0303)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301873</link>
            <guid>https://www.tenable.com/plugins/nessus/301873</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301873 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>An application running on a remote web server host is affected by a vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Splunk installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the SVD-2026-0303 advisory.<br /></span><span><br /></span><span>  - In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions     below 10.2.2510.5, 10.1.2507.16, 10.0.2503.11, and 9.3.2411.123, a low-privileged user that does not hold     the admin or power Splunk roles could access the `/splunkd/__raw/servicesNS/-/-/configs/conf-     passwords` REST API endpoint, which exposes the hashed or plaintext password values that are stored in the     passwords.conf configuration file due to improper access control. This vulnerability could allow for the     unauthorized disclosure of sensitive credentials. (CVE-2026-20164)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Splunk Enterprise to versions 10.2.0, 10.0.3, 9.4.9, 9.3.10 or higher. Splunk is actively monitoring and patching Splunk Cloud Platform instances.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301873">https://www.tenable.com/plugins/nessus/301873</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Splunk Enterprise 9.3.0 < 9.3.10, 9.4.0 < 9.4.9, 10.0.0 < 10.0.4, 10.2.0 < 10.2.1 (SVD-2026-0304)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301872</link>
            <guid>https://www.tenable.com/plugins/nessus/301872</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301872 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>An application running on a remote web server host is affected by a vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Splunk installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the SVD-2026-0304 advisory.<br /></span><span><br /></span><span>  - In Splunk Enterprise versions below 10.2.1, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions     below 10.2.2510.7, 10.1.2507.17, 10.0.2503.12, and 9.3.2411.124, a low-privileged user that does not hold     the admin or power Splunk roles could retrieve sensitive information by inspecting the job's search     log due to improper access control in the MongoClient logging channel. (CVE-2026-20165)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Splunk Enterprise to versions 10.2.1, 10.0.4, 9.4.9, 9.3.10, or higher. Splunk is actively monitoring and patching Splunk Cloud Platform instances.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301872">https://www.tenable.com/plugins/nessus/301872</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Splunk Enterprise 10.0.0 < 10.0.4, 10.2.0 < 10.2.1 (SVD-2026-0305)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301871</link>
            <guid>https://www.tenable.com/plugins/nessus/301871</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301871 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>An application running on a remote web server host is affected by a vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Splunk installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the SVD-2026-0305 advisory.<br /></span><span><br /></span><span>  - In Splunk Enterprise versions below 10.2.1 and 10.0.4, and Splunk Cloud Platform versions below     10.2.2510.5, 10.1.2507.16, and 10.0.2503.12, a low-privileged user that does not hold the admin or     power Splunk roles could retrieve the Observability Cloud API access token through the Discover Splunk     Observability Cloud app due to improper access control. This vulnerability does not affect Splunk     Enterprise versions below 9.4.9 and 9.3.10 because the Discover Splunk Observability Cloud app does not     come with Splunk Enterprise. (CVE-2026-20166)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Splunk Enterprise to versions 10.2.1, 10.0.4, or higher. Splunk is actively monitoring and patching Splunk Cloud Platform instances. To eliminate further risk and help ensure a high level of security in your environment, you must perform the following recommended actions after you upgrade Splunk Enterprise: Rotate the Observability API token (Create and manage organization access tokens using Splunk Observability Cloud).<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301871">https://www.tenable.com/plugins/nessus/301871</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-26131]]></title>
            <link>https://www.tenable.com/plugins/nessus/301849</link>
            <guid>https://www.tenable.com/plugins/nessus/301849</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301849 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-26131)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301849">https://www.tenable.com/plugins/nessus/301849</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-30930]]></title>
            <link>https://www.tenable.com/plugins/nessus/301848</link>
            <guid>https://www.tenable.com/plugins/nessus/301848</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301848 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, The TimescaleDB export     module constructs SQL queries using string concatenation with unsanitized system monitoring data. The     normalize() method wraps string values in single quotes but does not escape embedded single quotes, making     SQL injection trivial via attacker-controlled data such as process names, filesystem mount points, network     interface names, or container names. This vulnerability is fixed in 4.5.1. (CVE-2026-30930)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301848">https://www.tenable.com/plugins/nessus/301848</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[openSUSE 15 Security Update : c3p0 and mchange-commons (SUSE-SU-2026:0855-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301811</link>
            <guid>https://www.tenable.com/plugins/nessus/301811</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301811 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote openSUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0855-1 advisory.<br /></span><span><br /></span><span>    c3p0:<br /></span><span><br /></span><span>    - Security issues fixed:<br /></span><span><br /></span><span>      - CVE-2026-27830: Fixed unsafe object deserialization (bsc#1258942)<br /></span><span><br /></span><span>    - Fix the null pointer exception in the userOverridesAsString       method (bsc#1259313).<br /></span><span><br /></span><span>    mchange-commons:<br /></span><span><br /></span><span>    - Security issues fixed:<br /></span><span><br /></span><span>      - CVE-2026-27727: Disabled remote ClassLoading when dereferencing javax.naming.Reference instances     (bsc#1258913)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected c3p0, c3p0-javadoc, mchange-commons and / or mchange-commons-javadoc packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301811">https://www.tenable.com/plugins/nessus/301811</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft Office Products (March 2026) (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301784</link>
            <guid>https://www.tenable.com/plugins/nessus/301784</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301784 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft Office product installed on the remote host is affected by multiple vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Microsoft Office for Mac installed on the remote host is affected by multiple vulnerabilities as referenced in the march-10-2026 advisory.<br /></span><span><br /></span><span>  - Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.<br /></span><span>    (CVE-2026-26113)<br /></span><span><br /></span><span>  - Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.<br /></span><span>    (CVE-2026-26107)<br /></span><span><br /></span><span>  - Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code     locally. (CVE-2026-26108)<br /></span><span><br /></span><span>  - Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.<br /></span><span>    (CVE-2026-26109)<br /></span><span><br /></span><span>  - Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code     locally. (CVE-2026-26112)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Office for Mac version 16.107 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301784">https://www.tenable.com/plugins/nessus/301784</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078740: Windows Server 2025 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301780</link>
            <guid>https://www.tenable.com/plugins/nessus/301780</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301780 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078740 or hotpatch 5078736. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges     locally. (CVE-2026-24283)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)<br /></span><span><br /></span><span>  - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands.<br /></span><span>    (CVE-2026-26111)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078740 or hotpatch 5078736<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301780">https://www.tenable.com/plugins/nessus/301780</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft SharePoint Server 2016 (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301779</link>
            <guid>https://www.tenable.com/plugins/nessus/301779</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301779 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft SharePoint Server 2016 installation on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft SharePoint Server 2016 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - Remote Code Execution vulnerabilities (CVE-2026-26106,   CVE-2026-26113, CVE-2026-26114)   <br /></span><span>  - Spoofing vulnerability in Microsoft SharePoint Server   Subscription Edition (CVE-2026-26105)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but instead relies on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released security updates to address this issue.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301779">https://www.tenable.com/plugins/nessus/301779</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft Excel Products C2R (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301778</link>
            <guid>https://www.tenable.com/plugins/nessus/301778</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301778 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft Excel Products are missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft Excel Products are missing a security update. It is, therefore, affected by the following vulnerabilities:<br /></span><span><br /></span><span>  - Remote code execution vulnerabilities that an attacker can exploit to bypass authentication and execute     unauthorized arbitrary commands. (CVE-2026-26107, CVE-2026-26108, CVE-2026-26109, CVE-2026-26112)<br /></span><span><br /></span><span>  - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive     information. (CVE-2026-26144)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released patches to address these issues.<br /></span><span><br /></span><span>For Office 365, Office 2016 C2R, or Office 2019, ensure automatic updates are enabled or open any office app and manually perform an update.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301778">https://www.tenable.com/plugins/nessus/301778</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft Office Products (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301777</link>
            <guid>https://www.tenable.com/plugins/nessus/301777</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301777 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft Office Products are affected by multiple remote code execution vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft Office Products are missing security updates. They are, therefore, affected by multiple remote code execution vulnerabilities. An attacker can exploit these to bypass authentication and execute unauthorized arbitrary commands. (CVE-2026-26108, CVE-2026-26110)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released the following updates to address these issues:<br /></span><span>  - KB5002718<br /></span><span>  - KB5002838<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301777">https://www.tenable.com/plugins/nessus/301777</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078883: Windows 11 version 23H2 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301776</link>
            <guid>https://www.tenable.com/plugins/nessus/301776</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301776 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078883. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-23667)<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)     <br /></span><span>  - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.<br /></span><span>    (CVE-2026-25177, CVE-2026-25188)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078883<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301776">https://www.tenable.com/plugins/nessus/301776</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft SharePoint Server Subscription Edition (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301775</link>
            <guid>https://www.tenable.com/plugins/nessus/301775</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301775 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft SharePoint Server Subscription Edition installation on the remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft SharePoint Server Subscription Edition installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - Remote Code Execution vulnerabilities (CVE-2026-26106, CVE-2026-26113)<br /></span><span><br /></span><span>  - Spoofing vulnerability in Microsoft SharePoint Server Subscription Edition (CVE-2026-26105)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released security updates to address this issue.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301775">https://www.tenable.com/plugins/nessus/301775</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078775: Windows Server 2012 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301774</link>
            <guid>https://www.tenable.com/plugins/nessus/301774</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301774 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078775. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)<br /></span><span><br /></span><span>  - Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure     (ATBroker.exe) allows an authorized attacker to elevate privileges locally. (CVE-2026-24291)     <br /></span><span>  - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands.<br /></span><span>    (CVE-2026-26111) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078775<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301774">https://www.tenable.com/plugins/nessus/301774</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5079466: Windows 11 Version 26H1 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301773</link>
            <guid>https://www.tenable.com/plugins/nessus/301773</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301773 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5079466. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-23667)<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges     locally. (CVE-2026-24283)     <br /></span><span>  - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.<br /></span><span>    (CVE-2026-25177, CVE-2026-25188)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5079466<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301773">https://www.tenable.com/plugins/nessus/301773</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078885: Windows 10 version 21H2 / Windows 10 Version 22H2 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301772</link>
            <guid>https://www.tenable.com/plugins/nessus/301772</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301772 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078885. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-23667)<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)         <br /></span><span>  - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.<br /></span><span>    (CVE-2026-25177, CVE-2026-25188)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078885<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301772">https://www.tenable.com/plugins/nessus/301772</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078752: Windows 10 version 1809 / Windows Server 2019 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301771</link>
            <guid>https://www.tenable.com/plugins/nessus/301771</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301771 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078752. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-23667)<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)     <br /></span><span>  - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands.<br /></span><span>    (CVE-2026-26111)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078752<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301771">https://www.tenable.com/plugins/nessus/301771</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078774: Windows Server 2012 R2 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301770</link>
            <guid>https://www.tenable.com/plugins/nessus/301770</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301770 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078774. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)<br /></span><span><br /></span><span>  - Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure     (ATBroker.exe) allows an authorized attacker to elevate privileges locally. (CVE-2026-24291)<br /></span><span><br /></span><span>  - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands.<br /></span><span>    (CVE-2026-26111)     Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078774<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301770">https://www.tenable.com/plugins/nessus/301770</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft Office Products C2R (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301769</link>
            <guid>https://www.tenable.com/plugins/nessus/301769</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301769 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft Office Products are affected by multiple remote code execution vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - Remote code execution vulnerabilities. An attacker can exploit these to bypass authentication and execute     unauthorized arbitrary commands. (CVE-2026-26110, CVE-2026-26113)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released patches to address these issues.<br /></span><span><br /></span><span>For Office 365, Office 2016 C2R, or Office 2019, 2021 or 2024, ensure automatic updates are enabled or open any office app and manually perform an update.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301769">https://www.tenable.com/plugins/nessus/301769</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5079473: Windows 11 Version 24H2 / Windows 11 Version 25H2 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301768</link>
            <guid>https://www.tenable.com/plugins/nessus/301768</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301768 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5079473 or hotpatch 5079420. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Broadcast DVR allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-23667)<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges     locally. (CVE-2026-24283)   <br /></span><span>  - An elevation of privilege vulnerability. An attacker can exploit this to gain elevated privileges.<br /></span><span>    (CVE-2026-25177, CVE-2026-25188)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5079473 or hotpatch 5079420<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301768">https://www.tenable.com/plugins/nessus/301768</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078734: Windows Server version 23H2 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301767</link>
            <guid>https://www.tenable.com/plugins/nessus/301767</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301767 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078734. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges     locally. (CVE-2026-24283)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)   <br /></span><span>  - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands.<br /></span><span>    (CVE-2026-26111)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078734<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301767">https://www.tenable.com/plugins/nessus/301767</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft Excel Products (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301766</link>
            <guid>https://www.tenable.com/plugins/nessus/301766</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301766 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft Excel Products are missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft Excel Products are missing a security update. They are, therefore, affected by multiple remote code execution vulnerabilities. An attacker can exploit these to bypass authentication and execute unauthorized arbitrary commands. (CVE-2026-26107, CVE-2026-26108, CVE-2026-26109, CVE-2026-26112)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released KB5002849 to address this issue.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301766">https://www.tenable.com/plugins/nessus/301766</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078938: Windows 10 Version 1607 / Windows Server 2016 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301765</link>
            <guid>https://www.tenable.com/plugins/nessus/301765</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301765 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078938. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)<br /></span><span><br /></span><span>  - Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure     (ATBroker.exe) allows an authorized attacker to elevate privileges locally. (CVE-2026-24291)<br /></span><span><br /></span><span>  - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands.<br /></span><span>    (CVE-2026-26111)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078938<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301765">https://www.tenable.com/plugins/nessus/301765</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Office Online Server (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301764</link>
            <guid>https://www.tenable.com/plugins/nessus/301764</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301764 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Office Online Server installation on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The Office Online Server installation on the remote host is missing security updates. It is, therefore, affected by the following vulnerabilities:<br /></span><span><br /></span><span>  - Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.<br /></span><span>    (CVE-2026-26107)<br /></span><span><br /></span><span>  - Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code     locally. (CVE-2026-26108)<br /></span><span><br /></span><span>  - Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.<br /></span><span>    (CVE-2026-26109)<br /></span><span><br /></span><span>  - Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code     locally. (CVE-2026-26112)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released 5002835 to address this issue.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301764">https://www.tenable.com/plugins/nessus/301764</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[KB5078766: Windows Server 2022 / Azure Stack HCI 22H2 Security Update (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301763</link>
            <guid>https://www.tenable.com/plugins/nessus/301763</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301763 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote Windows host is missing security update 5078766 or hotpatch 5078737. It is, therefore, affected by multiple vulnerabilities<br /></span><span><br /></span><span>  - Use after free in Windows Print Spooler Components allows an authorized attacker to execute code over a     network. (CVE-2026-23669)<br /></span><span><br /></span><span>  - Use after free in Windows Win32K allows an authorized attacker to elevate privileges locally.<br /></span><span>    (CVE-2026-24285)<br /></span><span><br /></span><span>  - External control of file name or path in Windows Kernel allows an authorized attacker to elevate     privileges locally. (CVE-2026-24287)     <br /></span><span>  - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands.<br /></span><span>    (CVE-2026-26111)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply Security Update 5078766 or hotpatch 5078737<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301763">https://www.tenable.com/plugins/nessus/301763</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Security Updates for Microsoft SharePoint Server 2019 (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301762</link>
            <guid>https://www.tenable.com/plugins/nessus/301762</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301762 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Microsoft SharePoint Server 2019 installation on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft SharePoint Server 2019 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - Remote Code Execution vulnerabilities (CVE-2026-26106,   CVE-2026-26113, CVE-2026-26114)   <br /></span><span>  - Spoofing vulnerability in Microsoft SharePoint Server   Subscription Edition (CVE-2026-26105)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but instead relies on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Microsoft has released security updates to address this issue.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301762">https://www.tenable.com/plugins/nessus/301762</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3081]]></title>
            <link>https://www.tenable.com/plugins/nessus/301757</link>
            <guid>https://www.tenable.com/plugins/nessus/301757</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301757 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability. This     vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer.<br /></span><span>    Interaction with this library is required to exploit this vulnerability but attack vectors may vary     depending on the implementation. The specific flaw exists within the parsing of decoding units. The issue     results from the lack of proper validation of the length of user-supplied data prior to copying it to a     fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the     context of the current process. Was ZDI-CAN-28839. (CVE-2026-3081)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301757">https://www.tenable.com/plugins/nessus/301757</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3083]]></title>
            <link>https://www.tenable.com/plugins/nessus/301755</link>
            <guid>https://www.tenable.com/plugins/nessus/301755</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301755 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this     library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the processing of X-QDM RTP payload elements. When parsing     the packetid element, the process does not properly validate user-supplied data, which can result in a     write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in     the context of the current process. Was ZDI-CAN-28850. (CVE-2026-3083)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301755">https://www.tenable.com/plugins/nessus/301755</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3086]]></title>
            <link>https://www.tenable.com/plugins/nessus/301754</link>
            <guid>https://www.tenable.com/plugins/nessus/301754</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301754 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with     this library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the processing of APS units. The issue results from the     lack of proper validation of user-supplied data, which can result in a write past the end of an allocated     buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.<br /></span><span>    Was ZDI-CAN-28911. (CVE-2026-3086)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301754">https://www.tenable.com/plugins/nessus/301754</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-30929]]></title>
            <link>https://www.tenable.com/plugins/nessus/301752</link>
            <guid>https://www.tenable.com/plugins/nessus/301752</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301752 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image     it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and     6.9.13-41. (CVE-2026-30929)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301752">https://www.tenable.com/plugins/nessus/301752</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2922]]></title>
            <link>https://www.tenable.com/plugins/nessus/301751</link>
            <guid>https://www.tenable.com/plugins/nessus/301751</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301751 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with     this library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the processing of video packets. The issue results from     the lack of proper validation of user-supplied data, which can result in a write past the end of an     allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the     current process. Was ZDI-CAN-28845. (CVE-2026-2922)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301751">https://www.tenable.com/plugins/nessus/301751</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3084]]></title>
            <link>https://www.tenable.com/plugins/nessus/301750</link>
            <guid>https://www.tenable.com/plugins/nessus/301750</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301750 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with     this library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the parsing of picture partitions. The issue results from     the lack of proper validation of user-supplied data, which can result in an integer underflow before     writing to memory. An attacker can leverage this vulnerability to execute code in the context of the     current process. Was ZDI-CAN-28910. (CVE-2026-3084)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301750">https://www.tenable.com/plugins/nessus/301750</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2921]]></title>
            <link>https://www.tenable.com/plugins/nessus/301746</link>
            <guid>https://www.tenable.com/plugins/nessus/301746</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301746 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this     library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the handling of palette data in AVI files. The issue     results from the lack of proper validation of user-supplied data, which can result in an integer overflow     before writing to memory. An attacker can leverage this vulnerability to execute code in the context of     the current process. Was ZDI-CAN-28854. (CVE-2026-2921)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301746">https://www.tenable.com/plugins/nessus/301746</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-30931]]></title>
            <link>https://www.tenable.com/plugins/nessus/301745</link>
            <guid>https://www.tenable.com/plugins/nessus/301745</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301745 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16, a heap-based buffer overflow in the UHDR encoder can happen due to truncation of a     value and it would allow an out of bounds write. This vulnerability is fixed in 7.1.2-16. (CVE-2026-30931)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301745">https://www.tenable.com/plugins/nessus/301745</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-30883]]></title>
            <link>https://www.tenable.com/plugins/nessus/301744</link>
            <guid>https://www.tenable.com/plugins/nessus/301744</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301744 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when     encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. (CVE-2026-30883)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301744">https://www.tenable.com/plugins/nessus/301744</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3085]]></title>
            <link>https://www.tenable.com/plugins/nessus/301742</link>
            <guid>https://www.tenable.com/plugins/nessus/301742</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301742 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with     this library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the processing of X-QDM RTP payloads. The issue results     from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based     buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.<br /></span><span>    Was ZDI-CAN-28851. (CVE-2026-3085)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301742">https://www.tenable.com/plugins/nessus/301742</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2920]]></title>
            <link>https://www.tenable.com/plugins/nessus/301741</link>
            <guid>https://www.tenable.com/plugins/nessus/301741</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301741 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with     this library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the processing of stream headers within ASF files. The     issue results from the lack of proper validation of the length of user-supplied data prior to copying it     to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the     context of the current process. Was ZDI-CAN-28843. (CVE-2026-2920)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301741">https://www.tenable.com/plugins/nessus/301741</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2923]]></title>
            <link>https://www.tenable.com/plugins/nessus/301740</link>
            <guid>https://www.tenable.com/plugins/nessus/301740</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301740 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this     library is required to exploit this vulnerability but attack vectors may vary depending on the     implementation. The specific flaw exists within the handling of coordinates. The issue results from the     lack of proper validation of user-supplied data, which can result in a write past the end of an allocated     buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.<br /></span><span>    Was ZDI-CAN-28838. (CVE-2026-2923)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301740">https://www.tenable.com/plugins/nessus/301740</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31802]]></title>
            <link>https://www.tenable.com/plugins/nessus/301684</link>
            <guid>https://www.tenable.com/plugins/nessus/301684</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301684 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - node-tar is a full-featured Tar for Node.js. Prior to version 7.5.11, tar (npm) can be tricked into     creating a symlink that points outside the extraction directory by using a drive-relative symlink target     such as C:../../../target.txt, which enables file overwrite outside cwd during normal tar.x() extraction.<br /></span><span>    This vulnerability is fixed in 7.5.11. (CVE-2026-31802)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301684">https://www.tenable.com/plugins/nessus/301684</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-69647]]></title>
            <link>https://www.tenable.com/plugins/nessus/301568</link>
            <guid>https://www.tenable.com/plugins/nessus/301568</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301568 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GNU Binutils thru 2.45.1 readelf contains a denial-of-service vulnerability when processing a crafted     binary with malformed DWARF loclists data. A logic flaw in the DWARF parsing code can cause readelf to     repeatedly print the same table output without making forward progress, resulting in an unbounded output     loop that never terminates unless externally interrupted. A local attacker can trigger this behavior by     supplying a malicious input file, causing excessive CPU and I/O usage and preventing readelf from     completing its analysis. (CVE-2025-69647)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301568">https://www.tenable.com/plugins/nessus/301568</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-69648]]></title>
            <link>https://www.tenable.com/plugins/nessus/301566</link>
            <guid>https://www.tenable.com/plugins/nessus/301566</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301566 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GNU Binutils thru 2.45.1 readelf contains a denial-of-service vulnerability when processing a crafted     binary with malformed DWARF .debug_rnglists data. A logic flaw in the DWARF parsing path causes readelf to     repeatedly print the same warning message without making forward progress, resulting in a non-terminating     output loop that requires manual interruption. No evidence of memory corruption or code execution was     observed. (CVE-2025-69648)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301566">https://www.tenable.com/plugins/nessus/301566</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Vim < 9.2.0077 Heap-based Buffer Overflow (GHSA-r2gw-2x48-jj5p)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301510</link>
            <guid>https://www.tenable.com/plugins/nessus/301510</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301510 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Vim installed on the remote host is prior to 9.2.0077. It is, therefore, affected by a vulnerability as referenced in the GHSA-r2gw-2x48-jj5p advisory.<br /></span><span><br /></span><span>  - Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow     and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated     fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.     (CVE-2026-28421)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Vim version 9.2.0077 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301510">https://www.tenable.com/plugins/nessus/301510</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Vim < 9.2.0076 Heap-based Buffer Overflow and OOB Read (GHSA-rvj2-jrf9-2phg)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301509</link>
            <guid>https://www.tenable.com/plugins/nessus/301509</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301509 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Vim installed on the remote host is prior to 9.2.0076. It is, therefore, affected by a vulnerability as referenced in the GHSA-rvj2-jrf9-2phg advisory.<br /></span><span><br /></span><span>  - Vim is an open source, command line text editor. Prior to version 9.2.0076, a heap-based buffer overflow     WRITE and an out-of-bounds READ exist in Vim's terminal emulator when processing maximum combining     characters from Unicode supplementary planes. Version 9.2.0076 fixes the issue. (CVE-2026-28420)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Vim version 9.2.0076 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301509">https://www.tenable.com/plugins/nessus/301509</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GLSA-202603-01 : Exiv2: Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/301499</link>
            <guid>https://www.tenable.com/plugins/nessus/301499</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301499 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>null<br /></span>
      <h3>Description</h3>
      <span>The remote host is affected by the vulnerability described in GLSA-202603-01 (Exiv2: Multiple Vulnerabilities)<br /></span><span><br /></span><span>    The following vulnerabilities have been discovered in Exiv2: 2 out of bounds reads, an integer overflow,     and an uncaught exception. The worst of which can lead to a Denial of Service via a crash of the program.<br /></span><span>    Please review the CVE identifiers referenced below for details.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Gentoo Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>All Exiv2 users should upgrade to the latest version:<br /></span><span><br /></span><span>          # emerge --sync           # emerge --ask --oneshot --verbose >=media-gfx/exiv2-0.28.8<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301499">https://www.tenable.com/plugins/nessus/301499</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : kernel (RHSA-2026:3966)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301494</link>
            <guid>https://www.tenable.com/plugins/nessus/301494</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301494 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for kernel.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:3966 advisory.<br /></span><span><br /></span><span>    The kernel packages contain the Linux kernel, the core of any Linux operating system.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * kernel: Linux kernel io_uring: Local privilege escalation, information disclosure, or denial of service     via use-after-free (CVE-2025-38106)<br /></span><span><br /></span><span>    * kernel: macvlan: fix possible UAF in macvlan_forward_source() (CVE-2026-23001)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL kernel package based on the guidance in RHSA-2026:3966.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301494">https://www.tenable.com/plugins/nessus/301494</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3713]]></title>
            <link>https://www.tenable.com/plugins/nessus/301483</link>
            <guid>https://www.tenable.com/plugins/nessus/301483</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301483 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the function     do_pnm2png of the file contrib/pngminus/pnm2png.c of the component pnm2png. This manipulation of the     argument width/height causes heap-based buffer overflow. The attack is restricted to local execution. The     exploit has been published and may be used. The project was informed of the problem early through an issue     report but has not responded yet. (CVE-2026-3713)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301483">https://www.tenable.com/plugins/nessus/301483</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : vim (2026-651ba4626f)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301469</link>
            <guid>https://www.tenable.com/plugins/nessus/301469</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301469 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2026-651ba4626f advisory.<br /></span><span><br /></span><span>    Security fixes for CVE-2026-28417, CVE-2026-28418, CVE-2026-28419, CVE-2026-28420, CVE-2026-28421,     CVE-2026-28422<br /></span><span><br /></span><span>    ----<br /></span><span><br /></span><span>    Security fixes for CVE-2026-28417, CVE-2026-28418, CVE-2026-28419, CVE-2026-28420, CVE-2026-28421,     CVE-2026-28422<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected 2:vim package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301469">https://www.tenable.com/plugins/nessus/301469</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES16 Security Update : expat (SUSE-SU-2026:20627-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301459</link>
            <guid>https://www.tenable.com/plugins/nessus/301459</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301459 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES16 / SLES_SAP16 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:20627-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-24515: failure to copy the encoding handler data passed to XML_SetUnknownEncodingHandler may     cause a NULL       dereference (bsc#1257144).<br /></span><span>    - CVE-2026-25210: lack of buffer size check can lead to an integer overflow (bsc#1257496).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected expat, libexpat-devel and / or libexpat1 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301459">https://www.tenable.com/plugins/nessus/301459</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 44 : keylime / keylime-agent-rust (2026-2b8b223cf0)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301444</link>
            <guid>https://www.tenable.com/plugins/nessus/301444</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301444 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 44 host has packages installed that are affected by multiple vulnerabilities as referenced in the FEDORA-2026-2b8b223cf0 advisory.<br /></span><span><br /></span><span>    Update keylime to version 7.14.1 and keylime-agent-rust to version 0.2.9<br /></span><span><br /></span><span>    Fixes: CVE-2026-1709 and CVE-2025-13609<br /></span><span><br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected keylime and / or keylime-agent-rust packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301444">https://www.tenable.com/plugins/nessus/301444</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : javapackages-bootstrap (ALAS2023-2026-1449)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301343</link>
            <guid>https://www.tenable.com/plugins/nessus/301343</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301343 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1449 advisory.<br /></span><span><br /></span><span>    AssertJ provides Fluent testing assertions for Java and the Java Virtual Machine (JVM). Starting in     version 1.4.0 and prior to version 3.27.7, an XML External Entity (XXE) vulnerability exists in     `org.assertj.core.util.xml.XmlStringPrettyFormatter`: the `toXmlDocument(String)` method initializes     `DocumentBuilderFactory` with default settings, without disabling DTDs or external entities. This     formatter is used by the `isXmlEqualTo(CharSequence)` assertion for `CharSequence` values. An application     is vulnerable only when it uses untrusted XML input with either `isXmlEqualTo(CharSequence)` from     `org.assertj.core.api.AbstractCharSequenceAssert` or `xmlPrettyFormat(String)` from     `org.assertj.core.util.xml.XmlStringPrettyFormatter`. If untrusted XML input is processed by tone of these     methods, an attacker couldnread arbitrary local files via `file://` URIs (e.g., `/etc/passwd`, application     configuration files); perform Server-Side Request Forgery (SSRF) via HTTP/HTTPS URIs, and/or cause Denial     of Service via Billion Laughs entity expansion attacks. `isXmlEqualTo(CharSequence)` has been deprecated     in favor of XMLUnit in version 3.18.0 and will be removed in version 4.0. Users of affected versions     should, in order of preference: replace `isXmlEqualTo(CharSequence)` with XMLUnit, upgrade to version     3.27.7, or avoid using `isXmlEqualTo(CharSequence)` or `XmlStringPrettyFormatter` with untrusted input.<br /></span><span>    `XmlStringPrettyFormatter` has historically been considered a utility for `isXmlEqualTo(CharSequence)`     rather than a feature for AssertJ users, so it is deprecated in version 3.27.7 and removed in version 4.0,     with no replacement. (CVE-2026-24400)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update javapackages-bootstrap --releasever 2023.10.20260302' or   or 'dnf update --advisory ALAS2023-2026-1449 --releasever 2023.10.20260302' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301343">https://www.tenable.com/plugins/nessus/301343</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : assertj-core, assertj-core-javadoc (ALAS2023-2026-1448)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301341</link>
            <guid>https://www.tenable.com/plugins/nessus/301341</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301341 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1448 advisory.<br /></span><span><br /></span><span>    AssertJ provides Fluent testing assertions for Java and the Java Virtual Machine (JVM). Starting in     version 1.4.0 and prior to version 3.27.7, an XML External Entity (XXE) vulnerability exists in     `org.assertj.core.util.xml.XmlStringPrettyFormatter`: the `toXmlDocument(String)` method initializes     `DocumentBuilderFactory` with default settings, without disabling DTDs or external entities. This     formatter is used by the `isXmlEqualTo(CharSequence)` assertion for `CharSequence` values. An application     is vulnerable only when it uses untrusted XML input with either `isXmlEqualTo(CharSequence)` from     `org.assertj.core.api.AbstractCharSequenceAssert` or `xmlPrettyFormat(String)` from     `org.assertj.core.util.xml.XmlStringPrettyFormatter`. If untrusted XML input is processed by tone of these     methods, an attacker couldnread arbitrary local files via `file://` URIs (e.g., `/etc/passwd`, application     configuration files); perform Server-Side Request Forgery (SSRF) via HTTP/HTTPS URIs, and/or cause Denial     of Service via Billion Laughs entity expansion attacks. `isXmlEqualTo(CharSequence)` has been deprecated     in favor of XMLUnit in version 3.18.0 and will be removed in version 4.0. Users of affected versions     should, in order of preference: replace `isXmlEqualTo(CharSequence)` with XMLUnit, upgrade to version     3.27.7, or avoid using `isXmlEqualTo(CharSequence)` or `XmlStringPrettyFormatter` with untrusted input.<br /></span><span>    `XmlStringPrettyFormatter` has historically been considered a utility for `isXmlEqualTo(CharSequence)`     rather than a feature for AssertJ users, so it is deprecated in version 3.27.7 and removed in version 4.0,     with no replacement. (CVE-2026-24400)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update assertj-core --releasever 2023.10.20260302' or   or 'dnf update --advisory ALAS2023-2026-1448 --releasever 2023.10.20260302' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301341">https://www.tenable.com/plugins/nessus/301341</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : bpftool6.12, kernel6.12, kernel6.12-devel (ALAS2023-2026-1455)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301337</link>
            <guid>https://www.tenable.com/plugins/nessus/301337</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301337 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1455 advisory.<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    bpf: Reject narrower access to pointer ctx fields (CVE-2025-38591)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    sched_ext: Fix possible deadlock in the deferred_irq_workfn() (CVE-2025-68333)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    exfat: fix refcount leak in exfat_find (CVE-2025-68351)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    btrfs: fix racy bitfield write in btrfs_clear_space_info_full() (CVE-2025-68358)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    fs/ntfs3: Initialize allocated memory before use (CVE-2025-68365)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    bpf: Do not let BPF test infra emit invalid GSO types to stack (CVE-2025-68725)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (CVE-2025-71194)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv (CVE-2026-22996)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    net/sched: sch_qfq: do not free existing class in qfq_change_class() (CVE-2026-22999)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    net/mlx5e: Fix crash on profile change rollback failure (CVE-2026-23000)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    macvlan: fix possible UAF in macvlan_forward_source() (CVE-2026-23001)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    lib/buildid: use __kernel_read() for sleepable context (CVE-2026-23002)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() (CVE-2026-23003)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1 (CVE-2026-23005)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    ipv6: Fix use-after-free in inet6_addr_del(). (CVE-2026-23010)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    ipv4: ip_gre: make ipgre_header() robust (CVE-2026-23011)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    mm/page_alloc: prevent pcp corruption with SMP=n (CVE-2026-23025)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    null_blk: fix kmemleak by releasing references to fault configfs items (CVE-2026-23032)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (CVE-2026-23035)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() (CVE-2026-23038)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    pNFS: Fix a deadlock when returning a delegation during open() (CVE-2026-23050)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    NFS: Fix a deadlock involving nfs_release_folio() (CVE-2026-23053)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    net: hv_netvsc: reject RSS hash key programming without RX indirection table (CVE-2026-23054)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    vsock/virtio: Coalesce only linear skb (CVE-2026-23057)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (CVE-2026-23060)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    vsock/virtio: fix potential underflow in virtio_transport_get_credit() (CVE-2026-23069)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    regmap: Fix race condition in hwspinlock irqsave routine (CVE-2026-23071)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    net/sched: Enforce that teql can only be used as root qdisc (CVE-2026-23074)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    fou: Don't allow 0 for FOU_ATTR_IPPROTO. (CVE-2026-23083)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    irqchip/gic-v3-its: Avoid truncating memory addresses (CVE-2026-23085)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    vsock/virtio: cap TX credit to local buffer size (CVE-2026-23086)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    gue: Fix skb memleak with inner IP protocol 0. (CVE-2026-23095)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    migrate: correct lock ordering for hugetlb file folios (CVE-2026-23097)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    bonding: limit BOND_MODE_8023AD to Ethernet devices (CVE-2026-23099)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    ipvlan: Make the addrs_lock be per port (CVE-2026-23103)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (CVE-2026-23105)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (CVE-2026-23107)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    scsi: core: Wake up the error handler when final completions race against each other (CVE-2026-23110)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (CVE-2026-23113)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    bonding: provide a net pointer to __skb_flow_dissect() (CVE-2026-23119)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    ipv6: annotate data-race in ndisc_router_discovery() (CVE-2026-23124)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (CVE-2026-23125)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    netdevsim: fix a race issue related to the operation on bpf_bound_progs list (CVE-2026-23126)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    arm64: Set __nocfi on swsusp_arch_resume() (CVE-2026-23128)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    btrfs: send: check for inline extents in range_is_hole_in_parent() (CVE-2026-23141)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure (CVE-2026-23142)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure (CVE-2026-23144)<br /></span><span><br /></span><span>    In the Linux kernel, the following vulnerability has been resolved:<br /></span><span><br /></span><span>    ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (CVE-2026-23145)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update kernel6.12 --releasever 2023.10.20260302' or   or 'dnf update --advisory ALAS2023-2026-1455 --releasever 2023.10.20260302' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301337">https://www.tenable.com/plugins/nessus/301337</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[openSUSE 16 Security Update : assertj-core (openSUSE-SU-2026:20298-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301315</link>
            <guid>https://www.tenable.com/plugins/nessus/301315</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301315 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote openSUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote openSUSE 16 host has packages installed that are affected by a vulnerability as referenced in the openSUSE- SU-2026:20298-1 advisory.<br /></span><span><br /></span><span>    Upgrade to version 3.27.7:<br /></span><span><br /></span><span>    - CVE-2026-24400: Fix XXE vulnerability in isXmlEqualTo assertion (bsc#1257293).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected assertj-core and / or assertj-core-javadoc packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301315">https://www.tenable.com/plugins/nessus/301315</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[openSUSE 16 Security Update : expat (openSUSE-SU-2026:20306-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301308</link>
            <guid>https://www.tenable.com/plugins/nessus/301308</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301308 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote openSUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote openSUSE 16 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2026:20306-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-24515: failure to copy the encoding handler data passed to XML_SetUnknownEncodingHandler may     cause a NULL       dereference (bsc#1257144).<br /></span><span>    - CVE-2026-25210: lack of buffer size check can lead to an integer overflow (bsc#1257496).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected expat, libexpat-devel and / or libexpat1 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301308">https://www.tenable.com/plugins/nessus/301308</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES15 Security Update : ocaml (SUSE-SU-2026:0800-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301291</link>
            <guid>https://www.tenable.com/plugins/nessus/301291</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301291 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2026:0800-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-28364: missing bounds validation in readblock() can lead to arbitrary code execution     (bsc#1258992).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301291">https://www.tenable.com/plugins/nessus/301291</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[openSUSE 15 Security Update : expat (SUSE-SU-2026:0826-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301287</link>
            <guid>https://www.tenable.com/plugins/nessus/301287</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301287 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote openSUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0826-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-24515: Fixed a null dereference in XML_ExternalEntityParserCreate. (bsc#1257144)<br /></span><span>    - CVE-2026-25210: Fixed an integer overflow in doContent. (bsc#1257496)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301287">https://www.tenable.com/plugins/nessus/301287</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES16 Security Update : assertj-core (SUSE-SU-2026:20604-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301282</link>
            <guid>https://www.tenable.com/plugins/nessus/301282</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301282 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES16 / SLES_SAP16 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2026:20604-1 advisory.<br /></span><span><br /></span><span>    Upgrade to version 3.27.7:<br /></span><span><br /></span><span>    - CVE-2026-24400: Fix XXE vulnerability in isXmlEqualTo assertion (bsc#1257293).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected assertj-core and / or assertj-core-javadoc packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301282">https://www.tenable.com/plugins/nessus/301282</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLED15 / SLES15 / openSUSE 15 Security Update : ocaml (SUSE-SU-2026:0830-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301279</link>
            <guid>https://www.tenable.com/plugins/nessus/301279</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301279 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2026:0830-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-28364: missing bounds validation in readblock() can lead to arbitrary code execution     (bsc#1258992).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301279">https://www.tenable.com/plugins/nessus/301279</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Vim < 9.2.0075 Heap-based Buffer Underflow (GHSA-xcc8-r6c5-hvwv)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301248</link>
            <guid>https://www.tenable.com/plugins/nessus/301248</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301248 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Vim installed on the remote host is prior to 9.2.0075. It is, therefore, affected by a vulnerability as referenced in the GHSA-xcc8-r6c5-hvwv advisory.<br /></span><span><br /></span><span>  - Vim is an open source, command line text editor. Prior to version 9.2.0075, a heap-based buffer underflow     exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags file where a     delimiter appears at the start of a line, Vim attempts to read memory immediately preceding the allocated     buffer. Version 9.2.0075 fixes the issue. (CVE-2026-28419)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Vim version 9.2.0075 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301248">https://www.tenable.com/plugins/nessus/301248</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : Red Hat JBoss Enterprise Application Platform 8.0.12 (RHSA-2026:3891)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301160</link>
            <guid>https://www.tenable.com/plugins/nessus/301160</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301160 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for Red Hat JBoss Enterprise Application Platform 8.0.12.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:3891 advisory.<br /></span><span><br /></span><span>    Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly     application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.12 serves as a     replacement for Red Hat JBoss Enterprise Application Platform 8.0.11, and includes bug fixes and     enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.12 Release Notes for information     about the most significant bug fixes and enhancements included in this release.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache     Poisoning and SSRF [eap-8.0.z] (CVE-2025-12543)<br /></span><span><br /></span><span>    * undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-9784)<br /></span><span><br /></span><span>    * undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded [eap-8.0.z]     (CVE-2024-3884)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL Red Hat JBoss Enterprise Application Platform 8.0.12 package based on the guidance in RHSA-2026:3891.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301160">https://www.tenable.com/plugins/nessus/301160</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : Red Hat JBoss Enterprise Application Platform 8.0.12 (RHSA-2026:3889)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301159</link>
            <guid>https://www.tenable.com/plugins/nessus/301159</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301159 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for Red Hat JBoss Enterprise Application Platform 8.0.12.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:3889 advisory.<br /></span><span><br /></span><span>    Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly     application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.12 serves as a     replacement for Red Hat JBoss Enterprise Application Platform 8.0.11, and includes bug fixes and     enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.12 Release Notes for information     about the most significant bug fixes and enhancements included in this release.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache     Poisoning and SSRF [eap-8.0.z] (CVE-2025-12543)<br /></span><span><br /></span><span>    * undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-9784)<br /></span><span><br /></span><span>    * undertow: OutOfMemory when parsing form data encoding with     application/x-www-form-urlencoded [eap-8.0.z] (CVE-2024-3884)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL Red Hat JBoss Enterprise Application Platform 8.0.12 package based on the guidance in RHSA-2026:3889.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301159">https://www.tenable.com/plugins/nessus/301159</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-29022]]></title>
            <link>https://www.tenable.com/plugins/nessus/301145</link>
            <guid>https://www.tenable.com/plugins/nessus/301145</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301145 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - dr_libs version 0.14.4 and earlier (fixed in commit 8a7258c) contain a heap buffer overflow vulnerability     in the drwav__read_smpl_to_metadata_obj() function of dr_wav.h that allows memory corruption via crafted     WAV files. Attackers can exploit a mismatch between sampleLoopCount validation in pass 1 and unconditional     processing in pass 2 to overflow heap allocations with 36 bytes of attacker-controlled data through any     drwav_init_*_with_metadata() call on untrusted input. (CVE-2026-29022)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301145">https://www.tenable.com/plugins/nessus/301145</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Exiv2 0.28.7 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/301135</link>
            <guid>https://www.tenable.com/plugins/nessus/301135</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301135 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Exiv2 installed on the remote host is 0.28.7. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC     image metadata. In version 0.28.7, an out-of-bounds read was found. The vulnerability is in the CRW image     parser. (CVE-2026-25884)<br /></span><span><br /></span><span>  - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC     image metadata. In version 0.28.7, an out-of-bounds read was found in Exiv2. The vulnerability is in     the preview component, which is only triggered when running Exiv2 with an extra command line argument,     like -pp. The out-of-bounds read is at a 4GB offset, which usually causes Exiv2 to crash. (CVE-2026-27596)<br /></span><span><br /></span><span>  - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC     image metadata. In version 0.28.7, an uncaught exception was found in Exiv2. The vulnerability is in     the preview component, which is only triggered when running Exiv2 with an extra command line argument,     like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which causes Exiv2     to crash with an uncaught exception. (CVE-2026-27631)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Exiv2 version 0.28.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301135">https://www.tenable.com/plugins/nessus/301135</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27601]]></title>
            <link>https://www.tenable.com/plugins/nessus/300943</link>
            <guid>https://www.tenable.com/plugins/nessus/300943</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300943 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Underscore.js is a utility-belt library for JavaScript. Prior to 1.13.8, the _.flatten and _.isEqual     functions use recursion without a depth limit. Under very specific conditions, detailed below, an attacker     could exploit this in a Denial of Service (DoS) attack by triggering a stack overflow. Untrusted input     must be used to create a recursive datastructure, for example using JSON.parse, with no enforced depth     limit. The datastructure thus created must be passed to _.flatten or _.isEqual. In the case of _.flatten,     the vulnerability can only be exploited if it is possible for a remote client to prepare a datastructure     that consists of arrays at all levels AND if no finite depth limit is passed as the second argument to<br /></span><span>    _.flatten. In the case of _.isEqual, the vulnerability can only be exploited if there exists a code path     in which two distinct datastructures that were submitted by the same remote client are compared using<br /></span><span>    _.isEqual. For example, if a client submits data that are stored in a database, and the same client can     later submit another datastructure that is then compared to the data that were saved in the database     previously, OR if a client submits a single request, but its data are parsed twice, creating two non-     identical but equivalent datastructures that are then compared. Exceptions originating from the call to<br /></span><span>    _.flatten or _.isEqual, as a result of a stack overflow, are not being caught. This vulnerability is fixed     in 1.13.8. (CVE-2026-27601)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300943">https://www.tenable.com/plugins/nessus/300943</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Python Library Django 4.2.x < 4.2.29 / 5.2.x < 5.2.12 / 6.0.x < 6.0.3 DoS]]></title>
            <link>https://www.tenable.com/plugins/nessus/300915</link>
            <guid>https://www.tenable.com/plugins/nessus/300915</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300915 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A Python library installed on the remote host is affected by a denial of service vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The detected version of the Django Python package, is 4.2.x prior to 4.2.29, 5.2.x prior to 5.2.12, or 6.0.x prior to 6.0.3. It is, therefore, affected by a denial of service vulnerability as referenced by security release advisory:<br /></span><span><br /></span><span>  - An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.     `URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on     Windows that is disproportionately slow for certain Unicode characters, allowing a remote attacker to     cause denial of service via large URL inputs containing these characters. Earlier, unsupported Django     series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. (CVE-2026-25673)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Django version 4.2.29, 5.2.12, 6.0.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300915">https://www.tenable.com/plugins/nessus/300915</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Python Library Django 4.2.x < 4.2.29 / 5.2.x < 5.2.12 / 6.0.x < 6.0.3 Race Condition]]></title>
            <link>https://www.tenable.com/plugins/nessus/300914</link>
            <guid>https://www.tenable.com/plugins/nessus/300914</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300914 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>A Python library installed on the remote host is affected by a race condition vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The detected version of the Django Python package, is 4.2.x prior to 4.2.29, 5.2.x prior to 5.2.12, or 6.0.x prior to 6.0.3. It is, therefore, affected by a race condition vulnerability as referenced by security release advisory:<br /></span><span><br /></span><span>  - An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. Race condition in     file-system storage and file-based cache backends in Django allows an attacker to cause file system     objects to be created with incorrect permissions via concurrent requests, where one thread's temporary     `umask` change affects other threads in multi-threaded environments. Earlier, unsupported Django series     (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. (CVE-2026-25674)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Django version 4.2.29, 5.2.12, 6.0.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300914">https://www.tenable.com/plugins/nessus/300914</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 43 : keylime / keylime-agent-rust (2026-e5027335a3)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300875</link>
            <guid>https://www.tenable.com/plugins/nessus/300875</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300875 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 43 host has packages installed that are affected by multiple vulnerabilities as referenced in the FEDORA-2026-e5027335a3 advisory.<br /></span><span><br /></span><span>    Update keylime to version 7.14.1 and keylime-agent-rust to version 0.2.9<br /></span><span><br /></span><span>    Fixes: CVE-2026-1709 and CVE-2025-13609<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected keylime and / or keylime-agent-rust packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300875">https://www.tenable.com/plugins/nessus/300875</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3389]]></title>
            <link>https://www.tenable.com/plugins/nessus/300841</link>
            <guid>https://www.tenable.com/plugins/nessus/300841</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300841 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects the function     sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to null pointer     dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be     utilized. The project was informed of the problem early through an issue report but has not responded yet.<br /></span><span>    (CVE-2026-3389)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300841">https://www.tenable.com/plugins/nessus/300841</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zed < 0.224.4 Multiple Path Traversal Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/300838</link>
            <guid>https://www.tenable.com/plugins/nessus/300838</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300838 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A code editor installed on the remote host is affected by multiple path traversal vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Zed installed on the remote host is prior to 0.224.4. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - A Zip Slip path traversal vulnerability exists in the extension archive extraction functionality. The extract_zip()     function fails to validate ZIP entry filenames for path traversal sequences, allowing a malicious extension to write     files outside its designated sandbox directory by downloading and extracting a crafted ZIP archive.<br /></span><span>    (CVE-2026-27800)<br /></span><span><br /></span><span>  - A path traversal vulnerability exists in the extension installer tar extractor. The tar extractor creates symlinks     from the archive without validation, and the path guard only performs lexical prefix checks without resolving     symlinks. An attacker can ship a tar that creates a symlink inside the extension workdir pointing outside, then     writes files through the symlink, causing writes to arbitrary host paths. This escapes the extension sandbox and     enables code execution. (CVE-2026-27976)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zed version 0.224.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300838">https://www.tenable.com/plugins/nessus/300838</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : libxml2 (SUSE-SU-2026:0782-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300833</link>
            <guid>https://www.tenable.com/plugins/nessus/300833</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300833 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0782-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-0990: Fixed a call stack overflow leading to application crash due to infinite recursion in     `xmlCatalogXMLResolveURI`. (bsc#1256807, bsc#1256811)<br /></span><span>    - CVE-2026-0992: Fixed an excessive resource consumption when processing XML catalogs due to exponential     behavior. (bsc#1256809, bsc#1256812)<br /></span><span>    - CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell. (bsc#1257594, bsc#1257595)<br /></span><span>    - CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT. (bsc#1250553)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300833">https://www.tenable.com/plugins/nessus/300833</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fedora 42 : keylime / keylime-agent-rust (2026-c2b5451b35)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300825</link>
            <guid>https://www.tenable.com/plugins/nessus/300825</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300825 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Fedora host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Fedora 42 host has packages installed that are affected by multiple vulnerabilities as referenced in the FEDORA-2026-c2b5451b35 advisory.<br /></span><span><br /></span><span>    Update keylime to version 7.14.1 and keylime-agent-rust to version 0.2.9<br /></span><span><br /></span><span>    Fixes: CVE-2026-1709 and CVE-2025-13609<br /></span><span><br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Fedora security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected keylime and / or keylime-agent-rust packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300825">https://www.tenable.com/plugins/nessus/300825</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3449]]></title>
            <link>https://www.tenable.com/plugins/nessus/300775</link>
            <guid>https://www.tenable.com/plugins/nessus/300775</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300775 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Red Hat Enterprise Linux - @tootallnate/once: @tootallnate/once: Denial of Service due to incorrect     control flow scoping with AbortSignal (CVE-2026-3449)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300775">https://www.tenable.com/plugins/nessus/300775</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3388]]></title>
            <link>https://www.tenable.com/plugins/nessus/300656</link>
            <guid>https://www.tenable.com/plugins/nessus/300656</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300656 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability was found in Squirrel up to 3.2. This affects the function     SQCompiler::Factor/SQCompiler::UnaryOP of the file squirrel/sqcompiler.cpp. Performing a manipulation     results in uncontrolled recursion. The attack needs to be approached locally. The exploit has been made     public and could be used. The project was informed of the problem early through an issue report but has     not responded yet. (CVE-2026-3388)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300656">https://www.tenable.com/plugins/nessus/300656</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-64736]]></title>
            <link>https://www.tenable.com/plugins/nessus/300631</link>
            <guid>https://www.tenable.com/plugins/nessus/300631</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300631 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An out-of-bounds read vulnerability exists in the ABF parsing functionality of The Biosig Project     libbiosig 3.9.2 and Master Branch (5462afb0). A specially crafted .abf file can lead to an information     leak. An attacker can provide a malicious file to trigger this vulnerability. (CVE-2025-64736)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300631">https://www.tenable.com/plugins/nessus/300631</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27596]]></title>
            <link>https://www.tenable.com/plugins/nessus/300630</link>
            <guid>https://www.tenable.com/plugins/nessus/300630</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300630 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and     ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found in Exiv2. The vulnerability     is in the preview component, which is only triggered when running Exiv2 with an extra command line     argument, like -pp. The out-of-bounds read is at a 4GB offset, which usually causes Exiv2 to crash. This     issue has been patched in version 0.28.8. (CVE-2026-27596)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300630">https://www.tenable.com/plugins/nessus/300630</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-25884]]></title>
            <link>https://www.tenable.com/plugins/nessus/300627</link>
            <guid>https://www.tenable.com/plugins/nessus/300627</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300627 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and     ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found. The vulnerability is in the     CRW image parser. This issue has been patched in version 0.28.8. (CVE-2026-25884)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300627">https://www.tenable.com/plugins/nessus/300627</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3336]]></title>
            <link>https://www.tenable.com/plugins/nessus/300584</link>
            <guid>https://www.tenable.com/plugins/nessus/300584</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300584 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass     certificate chain verification when processing PKCS7 objects with multiple signers, except the final     signer. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to     AWS-LC version 1.69.0. (CVE-2026-3336)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300584">https://www.tenable.com/plugins/nessus/300584</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLED15 / SLES15 Security Update : expat (SUSE-SU-2026:0646-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300557</link>
            <guid>https://www.tenable.com/plugins/nessus/300557</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300557 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0646-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-24515: Fixed a null dereference in XML_ExternalEntityParserCreate. (bsc#1257144)<br /></span><span>    - CVE-2026-25210: Fixed an integer overflow in doContent. (bsc#1257496)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected expat, libexpat-devel, libexpat1 and / or libexpat1-32bit packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300557">https://www.tenable.com/plugins/nessus/300557</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : Mozilla -- Multiple vulnerabilities (15f4e0f6-1338-11f1-a55d-b42e991fc52e)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300552</link>
            <guid>https://www.tenable.com/plugins/nessus/300552</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300552 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 15f4e0f6-1338-11f1-a55d-b42e991fc52e advisory.<br /></span><span><br /></span><span>    CVE-2026-2809: Memory safety bug in the JavaScript: WebAssembly component.<br /></span><span>    CVE-2026-2808: Integer overflow in the JavaScript: Standard Library component.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300552">https://www.tenable.com/plugins/nessus/300552</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-28421]]></title>
            <link>https://www.tenable.com/plugins/nessus/300519</link>
            <guid>https://www.tenable.com/plugins/nessus/300519</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300519 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow     and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated     fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.<br /></span><span>    (CVE-2026-28421)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300519">https://www.tenable.com/plugins/nessus/300519</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27810]]></title>
            <link>https://www.tenable.com/plugins/nessus/300512</link>
            <guid>https://www.tenable.com/plugins/nessus/300512</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300512 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior     to version 9.4.0, an HTTP Response Header Injection vulnerability in the calibre Content Server allows any     authenticated user to inject arbitrary HTTP headers into server responses via an unsanitized     `content_disposition` query parameter in the `/get/` and `/data-files/get/` endpoints. All users running     the calibre Content Server with authentication enabled are affected. The vulnerability is exploitable by     any authenticated user and can also be triggered by tricking an authenticated victim into clicking a     crafted link. Version 9.4.0 contains a fix for the issue. (CVE-2026-27810)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300512">https://www.tenable.com/plugins/nessus/300512</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-28420]]></title>
            <link>https://www.tenable.com/plugins/nessus/300511</link>
            <guid>https://www.tenable.com/plugins/nessus/300511</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300511 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vim is an open source, command line text editor. Prior to version 9.2.0076, a heap-based buffer overflow     WRITE and an out-of-bounds READ exist in Vim's terminal emulator when processing maximum combining     characters from Unicode supplementary planes. Version 9.2.0076 fixes the issue. (CVE-2026-28420)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300511">https://www.tenable.com/plugins/nessus/300511</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-28419]]></title>
            <link>https://www.tenable.com/plugins/nessus/300505</link>
            <guid>https://www.tenable.com/plugins/nessus/300505</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300505 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vim is an open source, command line text editor. Prior to version 9.2.0075, a heap-based buffer underflow     exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags file where a     delimiter appears at the start of a line, Vim attempts to read memory immediately preceding the allocated     buffer. Version 9.2.0075 fixes the issue. (CVE-2026-28419)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300505">https://www.tenable.com/plugins/nessus/300505</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27824]]></title>
            <link>https://www.tenable.com/plugins/nessus/300504</link>
            <guid>https://www.tenable.com/plugins/nessus/300504</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300504 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Prior     to version 9.4.0, the calibre Content Server's brute-force protection mechanism uses a ban key derived     from both `remote_addr` and the `X-Forwarded-For` header. Since the `X-Forwarded-For` header is read     directly from the HTTP request without any validation or trusted-proxy configuration, an attacker can     bypass IP-based bans by simply changing or adding this header, rendering the brute-force protection     completely ineffective. This is particularly dangerous for calibre servers exposed to the internet, where     brute-force protection is the primary defense against credential stuffing and password guessing attacks.<br /></span><span>    Version 9.4.0 contains a fix for the issue. (CVE-2026-27824)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300504">https://www.tenable.com/plugins/nessus/300504</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27821]]></title>
            <link>https://www.tenable.com/plugins/nessus/300487</link>
            <guid>https://www.tenable.com/plugins/nessus/300487</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300487 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GPAC is an open-source multimedia framework. In versions up to and including 26.02.0, a stack buffer     overflow occurs during NHML file parsing in `src/filters/dmx_nhml.c`. The value of the xmlHeaderEnd XML     attribute is copied from att->value into szXmlHeaderEnd[1000] using strcpy() without any length     validation. If the input exceeds 1000 bytes, it overwrites beyond the stack buffer boundary. Commit     9bd7137fded2db40de61a2cf3045812c8741ec52 patches the issue. (CVE-2026-27821)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300487">https://www.tenable.com/plugins/nessus/300487</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27809]]></title>
            <link>https://www.tenable.com/plugins/nessus/300480</link>
            <guid>https://www.tenable.com/plugins/nessus/300480</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300480 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - psd-tools is a Python package for working with Adobe Photoshop PSD files. Prior to version 1.12.2, when a     PSD file contains malformed RLE-compressed image data (e.g. a literal run that extends past the expected     row size), decode_rle() raises ValueError which propagated all the way to the user, crashing     psd.composite() and psd-tools export. decompress() already had a fallback that replaces failed channels     with black pixels when result is None, but it never triggered because the ValueError from decode_rle() was     not caught. The fix in version 1.12.2 wraps the decode_rle() call in a try/except so the existing fallback     handles the error gracefully. (CVE-2026-27809)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300480">https://www.tenable.com/plugins/nessus/300480</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[IBM MQ 9.1 < 9.1.0.34 LTS / 9.2 < 9.2.0.41 LTS / 9.3 < 9.3.0.37 LTS / 9.3 < 9.4.5 CD / 9.4 < 9.4.0.20 LTS (7261944)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300430</link>
            <guid>https://www.tenable.com/plugins/nessus/300430</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300430 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote web server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of IBM MQ Server running on the remote host is affected by a vulnerability as referenced in the 7261944 advisory.<br /></span><span><br /></span><span>  - IBM MQ 9.1.0.0 through 9.1.0.33 LTS, 9.2.0.0 through 9.2.0.40 LTS, 9.3.0.0 through 9.3.0.36 LTS, 9.30.0     through 9.3.5.1 CD, 9.4.0.0 through 9.4.0.17 LTS, and 9.4.0.0 through 9.4.4.1 CD (CVE-2026-1713)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to IBM MQ 9.1.0.34 LTS, 9.2.0.41 LTS, 9.3.0.37 LTS, 9.4.0.20 LTS, 9.4.5 CD or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300430">https://www.tenable.com/plugins/nessus/300430</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27699]]></title>
            <link>https://www.tenable.com/plugins/nessus/300394</link>
            <guid>https://www.tenable.com/plugins/nessus/300394</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300394 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The `basic-ftp` FTP client library for Node.js contains a path traversal vulnerability (CWE-22) in     versions prior to 5.2.0 in the `downloadToDir()` method. A malicious FTP server can send directory     listings with filenames containing path traversal sequences (`../`) that cause files to be written outside     the intended download directory. Version 5.2.0 patches the issue. (CVE-2026-27699)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300394">https://www.tenable.com/plugins/nessus/300394</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27631]]></title>
            <link>https://www.tenable.com/plugins/nessus/300392</link>
            <guid>https://www.tenable.com/plugins/nessus/300392</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300392 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and     ICC image metadata. Prior to version 0.28.8, an uncaught exception was found in Exiv2. The vulnerability     is in the preview component, which is only triggered when running Exiv2 with an extra command line     argument, like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which     causes Exiv2 to crash with an uncaught exception. This issue has been patched in version 0.28.8.<br /></span><span>    (CVE-2026-27631)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300392">https://www.tenable.com/plugins/nessus/300392</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23865]]></title>
            <link>https://www.tenable.com/plugins/nessus/300295</link>
            <guid>https://www.tenable.com/plugins/nessus/300295</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300295 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions     2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in     OpenType variable fonts. This issue is fixed in version 2.14.2. (CVE-2026-23865)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300295">https://www.tenable.com/plugins/nessus/300295</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[IBM WebSphere Application Server Liberty 17.0.0.3 < 26.0.0.3 (7261761)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300293</link>
            <guid>https://www.tenable.com/plugins/nessus/300293</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300293 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote web application server is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of IBM WebSphere Application Server Liberty running on the remote host is affected by a vulnerability as referenced in the 7261761 advisory.<br /></span><span><br /></span><span>  - IBM WebSphere Application Server Liberty could provide weaker than expected security when using the     Security Utility when administering security settings. CWE: CWE-321: Use of Hard-coded Cryptographic Key     (CVE-2025-14923)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to IBM WebSphere Application Server Liberty version 26.0.0.3 or later. Alternatively, upgrade to the minimal fix pack levels required by the interim fix and then apply Interim Fix PH69658.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300293">https://www.tenable.com/plugins/nessus/300293</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zed < 0.225.9 Symlink Escape (CVE-2026-27967)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300255</link>
            <guid>https://www.tenable.com/plugins/nessus/300255</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300255 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A code editor installed on the remote host is affected by a symlink escape vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Zed installed on the remote host is prior to 0.225.9. It is, therefore, affected by a symlink escape vulnerability:<br /></span><span><br /></span><span>  - A symlink escape vulnerability exists in the Zed Agent file tools (read_file, edit_file) that allows reading and     writing files outside the project directory when a project contains symbolic links pointing to external paths. This     bypasses the intended workspace boundary and privacy protections, potentially leaking sensitive user data to the     LLM. (CVE-2026-27967)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zed version 0.225.9 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300255">https://www.tenable.com/plugins/nessus/300255</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[VMWare Aria Operations 8.x < 8.18.6 Multiple Vulnerabilities (VMSA-2026-0001)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300235</link>
            <guid>https://www.tenable.com/plugins/nessus/300235</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300235 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web application running on the remote server is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, the instance of VMWare Aria Operations (formerly vRealize Operations) running on the remote web server is 8.x < 8.18.6. It is, therefore, affected by the following:<br /></span><span><br /></span><span>  - VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this     issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while     support-assisted product migration is in progress. (CVE-2026-22719)   <br /></span><span>  - VMware Aria Operations contains a stored cross-site scripting vulnerability. A malicious actor with privileges to     create custom benchmarks may be able to inject script to perform administrative actions in VMware Aria Operations.<br /></span><span>    (CVE-2026-22720)<br /></span><span><br /></span><span>  - VMware Aria Operations contains a privilege escalation vulnerability. A malicious actor with privileges in vCenter to     access Aria Operations may leverage this vulnerability to obtain administrative access in VMware Aria Operations.<br /></span><span>    (CVE-2026-22721)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to VMWare Aria Operations 8.18.6.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300235">https://www.tenable.com/plugins/nessus/300235</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SUSE SLES12 Security Update : expat (SUSE-SU-2026:0647-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300232</link>
            <guid>https://www.tenable.com/plugins/nessus/300232</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300232 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote SUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0647-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-24515: Fixed a null dereference in XML_ExternalEntityParserCreate. (bsc#1257144)<br /></span><span>    - CVE-2026-25210: Fixed an integer overflow in doContent. (bsc#1257496)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected expat, libexpat-devel, libexpat1 and / or libexpat1-32bit packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300232">https://www.tenable.com/plugins/nessus/300232</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-28364]]></title>
            <link>https://www.tenable.com/plugins/nessus/300178</link>
            <guid>https://www.tenable.com/plugins/nessus/300178</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300178 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization     (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability     stems from missing bounds validation in the readblock() function, which performs unbounded memcpy()     operations using attacker-controlled lengths from crafted Marshal data. (CVE-2026-28364)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300178">https://www.tenable.com/plugins/nessus/300178</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3201]]></title>
            <link>https://www.tenable.com/plugins/nessus/300144</link>
            <guid>https://www.tenable.com/plugins/nessus/300144</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300144 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial     of service (CVE-2026-3201)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300144">https://www.tenable.com/plugins/nessus/300144</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3203]]></title>
            <link>https://www.tenable.com/plugins/nessus/300138</link>
            <guid>https://www.tenable.com/plugins/nessus/300138</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300138 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of     service (CVE-2026-3203)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300138">https://www.tenable.com/plugins/nessus/300138</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27798]]></title>
            <link>https://www.tenable.com/plugins/nessus/300130</link>
            <guid>https://www.tenable.com/plugins/nessus/300130</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300130 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability occurs when processing an image     with small dimension using the `-wavelet-denoise` operator. Versions 7.1.2-15 and 6.9.13-40 contain a     patch. (CVE-2026-27798)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300130">https://www.tenable.com/plugins/nessus/300130</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : FreeBSD -- Jail chroot escape via fd exchange with a different jail (a88f5b2d-11e9-11f1-8148-bc241121aa0a)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300106</link>
            <guid>https://www.tenable.com/plugins/nessus/300106</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300106 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the a88f5b2d-11e9-11f1-8148-bc241121aa0a advisory.<br /></span><span><br /></span><span>    If two sibling jails are restricted to separate filesystem             trees, which is to say that neither of the two jail root directories             is an ancestor of the other, jailed processes may nonetheless be             able to access a shared directory via a nullfs mount, if the             administrator has configured one.<br /></span><span>    In this case, cooperating processes in the two jails may establish             a connection using a unix domain socket and exchange directory             descriptors with each other.<br /></span><span>    When performing a filesystem name lookup, at each step of the lookup,             the kernel checks whether the lookup would descend below the jail             root of the current process.  If the jail root directory is not             encountered, the lookup continues.<br /></span><span>    In a configuration where processes in two different jails are             able to exchange file descriptors using a unix domain socket, it             is possible for a jailed process to receive a directory for a             descriptor that is below that process' jail root.  This enables             full filesystem access for a jailed process, breaking the chroot.<br /></span><span>    Note that the system administrator is still responsible for ensuring             that an unprivileged user on the jail host is not able to pass             directory descriptors to a jailed process, even in a patched             kernel.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300106">https://www.tenable.com/plugins/nessus/300106</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : FreeBSD -- Local DoS and possible privilege escalation via routing sockets (fbc47390-11e9-11f1-8148-bc241121aa0a)]]></title>
            <link>https://www.tenable.com/plugins/nessus/300102</link>
            <guid>https://www.tenable.com/plugins/nessus/300102</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300102 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the fbc47390-11e9-11f1-8148-bc241121aa0a advisory.<br /></span><span><br /></span><span>    The rtsock_msg_buffer() function serializes routing information             into a buffer.  As a part of this, it copies sockaddr structures             into a sockaddr_storage structure on the stack.  It assumes that             the source sockaddr length field had already been validated, but             this is not necessarily the case, and it's possible for a malicious             userspace program to craft a request which triggers a 127-byte             overflow.<br /></span><span>    In practice, this overflow immediately overwrites the canary for             the rtsock_msg_buffer() stack frame, resulting in a panic once the             function returns.<br /></span><span>    The bug allows an unprivileged user to crash the kernel by             triggering a stack buffer overflow in rtsock_msg_buffer().  In             particular, the overflow will corrupt a stack canary value that is             verified when the function returns; this mitigates the impact of             the stack overflow by triggering a kernel panic.<br /></span><span>    Other kernel bugs may exist which allow userspace to find the canary             value and thus defeat the mitigation, at which point local privilege             escalation may be possible.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300102">https://www.tenable.com/plugins/nessus/300102</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-25969]]></title>
            <link>https://www.tenable.com/plugins/nessus/300064</link>
            <guid>https://www.tenable.com/plugins/nessus/300064</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300064 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     version 7.1.2-15, a memory leak exists in `coders/ashlar.c`. The `WriteASHLARImage` allocates a structure.<br /></span><span>    However, when an exception is thrown, the allocated memory is not properly released, resulting in a     potential memory leak. Version 7.1.2-15 contains a patch. (CVE-2026-25969)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300064">https://www.tenable.com/plugins/nessus/300064</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1229]]></title>
            <link>https://www.tenable.com/plugins/nessus/300048</link>
            <guid>https://www.tenable.com/plugins/nessus/300048</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300048 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The CombinedMult function in the CIRCL ecc/p384 package (secp384r1 curve) produces an incorrect value for     specific inputs. The issue is fixed by using complete addition formulas. ECDH and ECDSA signing relying on     this curve are not affected. The bug was fixed in v1.6.3     https://github.com/cloudflare/circl/releases/tag/v1.6.3 . (CVE-2026-1229)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300048">https://www.tenable.com/plugins/nessus/300048</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-27606]]></title>
            <link>https://www.tenable.com/plugins/nessus/300045</link>
            <guid>https://www.tenable.com/plugins/nessus/300045</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300045 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Rollup is a module bundler for JavaScript. Versions prior to 2.80.0, 3.30.0, and 4.59.0 of the Rollup     module bundler (specifically v4.x and present in current source) is vulnerable to an Arbitrary File Write     via Path Traversal. Insecure file name sanitization in the core engine allows an attacker to control     output filenames (e.g., via CLI named inputs, manual chunk aliases, or malicious plugins) and use     traversal sequences (`../`) to overwrite files anywhere on the host filesystem that the build process has     permissions for. This can lead to persistent Remote Code Execution (RCE) by overwriting critical system or     user configuration files. Versions 2.80.0, 3.30.0, and 4.59.0 contain a patch for the issue.<br /></span><span>    (CVE-2026-27606)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300045">https://www.tenable.com/plugins/nessus/300045</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-25967]]></title>
            <link>https://www.tenable.com/plugins/nessus/300032</link>
            <guid>https://www.tenable.com/plugins/nessus/300032</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300032 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     version 7.1.2-15, a stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted     FTXT file can cause out-of-bounds writes on the stack, leading to a crash. Version 7.1.2-15 contains a     patch. (CVE-2026-25967)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300032">https://www.tenable.com/plugins/nessus/300032</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco Catalyst SD-WAN Manager Multiple Vulnerabilities (cisco-sa-sdwan-authbp-qwCX8D4v)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299999</link>
            <guid>https://www.tenable.com/plugins/nessus/299999</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299999 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote device is missing a vendor-supplied security patch.<br /></span>
      <h3>Description</h3>
      <span>According to its self-reported version, Cisco Catalyst SD-WAN Manager is affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - A vulnerability could allow an authenticated, local attacker to escalate privileges on the     underlying operating system. (CVE-2026-20126)<br /></span><span><br /></span><span>  - A vulnerability could allow an unauthenticated, remote attacker to access sensitive information     from the affected system. (CVE-2026-20133)<br /></span><span><br /></span><span>  - A vulnerability could allow an authenticated, remote attacker to modify data and impact     availability of the system. (CVE-2026-20122)<br /></span><span><br /></span><span>Please see the included Cisco BIDs and Cisco Security Advisory for more information.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCws33583, CSCws33584, CSCws33586, CSCws93470.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299999">https://www.tenable.com/plugins/nessus/299999</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2760]]></title>
            <link>https://www.tenable.com/plugins/nessus/299922</link>
            <guid>https://www.tenable.com/plugins/nessus/299922</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299922 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This     vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and     Thunderbird < 140.8. (CVE-2026-2760)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299922">https://www.tenable.com/plugins/nessus/299922</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-25966]]></title>
            <link>https://www.tenable.com/plugins/nessus/299907</link>
            <guid>https://www.tenable.com/plugins/nessus/299907</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299907 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. The shipped     secure security policy includes a rule intended to prevent reading/writing from standard streams.<br /></span><span>    However, ImageMagick also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1). Prior to versions 7.1.2-15     and 6.9.13-40, this path form is not blocked by the secure policy templates, and therefore bypasses the     protection goal of no stdin/stdout. Versions 7.1.2-15 and 6.9.13-40 contain a patch by including a     change to the more secure policies by default. As a workaround, add the change to one's security policy     manually. (CVE-2026-25966)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299907">https://www.tenable.com/plugins/nessus/299907</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Metabase < 0.57.13 / 0.58.x < 0.58.7 / 1.x < 1.57.13 / 1.58.x < 1.58.7 Information Disclosure]]></title>
            <link>https://www.tenable.com/plugins/nessus/299881</link>
            <guid>https://www.tenable.com/plugins/nessus/299881</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299881 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is affected by an information disclosure vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Metabase installed on the remote host is prior to 0.57.13, 0.58.x prior to 0.58.7, 1.x prior to 1.57.13, or 1.58.x prior to 1.58.7. It is, therefore, affected by an information disclosure vulnerability:<br /></span><span><br /></span><span>  - Authenticated users are able to retrieve sensitive information from a Metabase instance, including database     access credentials. A low-privileged user can extract sensitive information including database credentials     into the email body via template evaluation. (CVE-2026-27464)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Metabase version 0.57.13, 0.58.7, 1.57.13, 1.58.7, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299881">https://www.tenable.com/plugins/nessus/299881</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Linux PHSA-2026-5.0-0770]]></title>
            <link>https://www.tenable.com/plugins/nessus/299743</link>
            <guid>https://www.tenable.com/plugins/nessus/299743</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299743 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the linux package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299743">https://www.tenable.com/plugins/nessus/299743</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-25896]]></title>
            <link>https://www.tenable.com/plugins/nessus/299725</link>
            <guid>https://www.tenable.com/plugins/nessus/299725</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299725 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without     C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is     treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML     entities (<, >, &, , ') with arbitrary values. This bypasses entity encoding and     leads to XSS when parsed output is rendered. This vulnerability is fixed in 5.3.5. (CVE-2026-25896)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299725">https://www.tenable.com/plugins/nessus/299725</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[openSUSE 15 Security Update : vexctl (SUSE-SU-2026:0592-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299709</link>
            <guid>https://www.tenable.com/plugins/nessus/299709</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299709 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote openSUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote openSUSE 15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0592-1 advisory.<br /></span><span><br /></span><span>    - Update to version 0.4.1+git78.f951e3a:<br /></span><span>    - CVE-2025-22868: Unexpected memory consumption during token parsing in golang.org/x/oauth2. (bsc#1239186)<br /></span><span>    - CVE-2024-45337: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in     golang.org/x/crypto. (bsc#1234486)<br /></span><span>    - CVE-2025-27144: Go JOSE's Parsing Vulnerable to Denial of Service. (bsc#1237611)<br /></span><span>    - CVE-2025-22870: proxy bypass using IPv6 zone IDs. (bsc#1238683)<br /></span><span>    - CVE-2025-22869: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh. (bsc#1239323)<br /></span><span>    - CVE-2025-30204: jwt-go allows excessive memory allocation during header parsing. (bsc#1240444)<br /></span><span>    - CVE-2025-58181: invalidated number of mechanisms can cause unbounded memory consumption. (bsc#1253802)<br /></span><span>    - CVE-2026-22772: MetaIssuer URL validation bypass can trigger SSRF to arbitrary internal services.<br /></span><span>    (bsc#1256535)<br /></span><span>    - CVE-2026-24137: legacy TUF client allows for arbitrary file writes with target cache path traversal.<br /></span><span>    (bsc#1257138)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected vexctl package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299709">https://www.tenable.com/plugins/nessus/299709</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AIX (IJ57276)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299610</link>
            <guid>https://www.tenable.com/plugins/nessus/299610</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299610 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AIX host is missing a security patch.<br /></span>
      <h3>Description</h3>
      <span>The version of AIX installed on the remote host is prior to APAR IJ57276. It is, therefore, affected by a vulnerability as referenced in the IJ57276 advisory.<br /></span><span><br /></span><span>  - A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability     affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to     uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public     and may be used. The real existence of this vulnerability is still doubted at the moment. The code     maintainer explains, that [t]he issue can only be triggered with untrusted SGML catalogs and it makes     absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at     all. (CVE-2025-8732)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Please apply the appropriate interim fix per APAR IJ57276.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299610">https://www.tenable.com/plugins/nessus/299610</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-14009]]></title>
            <link>https://www.tenable.com/plugins/nessus/299599</link>
            <guid>https://www.tenable.com/plugins/nessus/299599</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299599 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The<br /></span><span>    _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or     security checks. This allows attackers to craft malicious zip packages that, when downloaded and extracted     by NLTK, can execute arbitrary code. The vulnerability arises because NLTK assumes all downloaded packages     are trusted and extracts them without validation. If a malicious package contains Python files, such as<br /></span><span>    __init__.py, these files are executed automatically upon import, leading to remote code execution. This     issue can result in full system compromise, including file system access, network access, and potential     persistence mechanisms. (CVE-2025-14009)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299599">https://www.tenable.com/plugins/nessus/299599</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : firefox, --advisory ALAS2FIREFOX-2026-051 (ALASFIREFOX-2026-051)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299553</link>
            <guid>https://www.tenable.com/plugins/nessus/299553</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299553 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of firefox installed on the remote host is prior to 140.7.0-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2FIREFOX-2026-051 advisory.<br /></span><span><br /></span><span>    HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability     exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function     fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned     pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when     using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to     call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and     a Segmentation Fault. This issue has been patched in version 12.3.0. (CVE-2026-22693)<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the     libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit     output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018.<br /></span><span>    This vulnerability is fixed in 1.6.54. (CVE-2026-22695)<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng     simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read     when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535     bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings     on 16-bit systems. This vulnerability is fixed in 1.6.54. (CVE-2026-22801)<br /></span><span><br /></span><span>    In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize     because there is no integer overflow check for tag buffer reallocation. (CVE-2026-25210)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update firefox' or   or 'yum update --advisory ALAS2FIREFOX-2026-051' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299553">https://www.tenable.com/plugins/nessus/299553</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : firefox (ALAS2023-2026-1424)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299540</link>
            <guid>https://www.tenable.com/plugins/nessus/299540</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299540 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1424 advisory.<br /></span><span><br /></span><span>    In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize     because there is no integer overflow check for tag buffer reallocation. (CVE-2026-25210)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update firefox --releasever 2023.10.20260216' or   or 'dnf update --advisory ALAS2023-2026-1424 --releasever 2023.10.20260216' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299540">https://www.tenable.com/plugins/nessus/299540</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : thunderbird, --advisory ALAS2-2026-3171 (ALAS-2026-3171)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299539</link>
            <guid>https://www.tenable.com/plugins/nessus/299539</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299539 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of thunderbird installed on the remote host is prior to 140.7.1-1. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2026-3171 advisory.<br /></span><span><br /></span><span>    HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability     exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function     fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned     pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when     using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to     call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and     a Segmentation Fault. This issue has been patched in version 12.3.0. (CVE-2026-22693)<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the     libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit     output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018.<br /></span><span>    This vulnerability is fixed in 1.6.54. (CVE-2026-22695)<br /></span><span><br /></span><span>    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng     simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read     when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535     bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings     on 16-bit systems. This vulnerability is fixed in 1.6.54. (CVE-2026-22801)<br /></span><span><br /></span><span>    In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize     because there is no integer overflow check for tag buffer reallocation. (CVE-2026-25210)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update thunderbird' or   or 'yum update --advisory ALAS2-2026-3171' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299539">https://www.tenable.com/plugins/nessus/299539</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2 : expat, --advisory ALAS2-2026-3170 (ALAS-2026-3170)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299537</link>
            <guid>https://www.tenable.com/plugins/nessus/299537</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299537 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of expat installed on the remote host is prior to 2.1.0-15. It is, therefore, affected by a vulnerability as referenced in the ALAS2-2026-3170 advisory.<br /></span><span><br /></span><span>    In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize     because there is no integer overflow check for tag buffer reallocation. (CVE-2026-25210)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'yum update expat' or   or 'yum update --advisory ALAS2-2026-3170' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299537">https://www.tenable.com/plugins/nessus/299537</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : python3.13-filelock (ALAS2023-2026-1411)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299516</link>
            <guid>https://www.tenable.com/plugins/nessus/299516</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299516 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2026-1411 advisory.<br /></span><span><br /></span><span>    filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-     Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files     through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where     filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing     to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and     truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted.<br /></span><span>    The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability     to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation     succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1.<br /></span><span>    If immediate upgrade is not possible, use SoftFileLock instead of UnixFileLock/WindowsFileLock (note:<br /></span><span>    different locking semantics, may not be suitable for all use cases); ensure lock file directories have     restrictive permissions (chmod 0700) to prevent untrusted users from creating symlinks; and/or monitor     lock file directories for suspicious symlinks before running trusted applications. These workarounds     provide only partial mitigation. The race condition remains exploitable. Upgrading to version 3.20.1 is     strongly recommended. (CVE-2025-68146)<br /></span><span><br /></span><span>    filelock is a platform-independent file lock for Python. Prior to version 3.20.3, a TOCTOU race condition     vulnerability exists in the SoftFileLock implementation of the filelock package. An attacker with local     filesystem access and permission to create symlinks can exploit a race condition between the permission     validation and file creation to cause lock operations to fail or behave unexpectedly. The vulnerability     occurs in the _acquire() method between raise_on_not_writable_file() (permission check) and os.open()     (file creation). During this race window, an attacker can create a symlink at the lock file path,     potentially causing the lock to operate on an unintended target file or leading to denial of service. This     issue has been patched in version 3.20.3. (CVE-2026-22701)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update python3.13-filelock --releasever 2023.10.20260216' or   or 'dnf update --advisory ALAS2023-2026-1411 --releasever 2023.10.20260216' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299516">https://www.tenable.com/plugins/nessus/299516</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon Linux 2023 : expat, expat-devel, expat-static (ALAS2023-2026-1425)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299514</link>
            <guid>https://www.tenable.com/plugins/nessus/299514</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299514 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Amazon Linux 2023 host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>It is, therefore, affected by a vulnerability as referenced in the ALAS2023-2026-1425 advisory.<br /></span><span><br /></span><span>    In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize     because there is no integer overflow check for tag buffer reallocation. (CVE-2026-25210)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the tested product security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Run 'dnf update expat --releasever 2023.10.20260216' or   or 'dnf update --advisory ALAS2023-2026-1425 --releasever 2023.10.20260216' to update your system.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299514">https://www.tenable.com/plugins/nessus/299514</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-24733]]></title>
            <link>https://www.tenable.com/plugins/nessus/299445</link>
            <guid>https://www.tenable.com/plugins/nessus/299445</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299445 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the     GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests,     the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request     using HTTP/0.9. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through     10.1.49, from 9.0.0.M1 through 9.0.112. Older, EOL versions are also affected. Users are recommended to     upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.<br /></span><span>    (CVE-2026-24733)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299445">https://www.tenable.com/plugins/nessus/299445</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23226]]></title>
            <link>https://www.tenable.com/plugins/nessus/299441</link>
            <guid>https://www.tenable.com/plugins/nessus/299441</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299441 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ksmbd: add chann_lock to protect ksmbd_chann_list xarray ksmbd_chann_list xarray lacks synchronization,     allowing use-after-free in multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del). Adds     rw_semaphore chann_lock to struct ksmbd_session and protects all xa_load/xa_store/xa_erase accesses.<br /></span><span>    (CVE-2026-23226)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299441">https://www.tenable.com/plugins/nessus/299441</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-66614]]></title>
            <link>https://www.tenable.com/plugins/nessus/299434</link>
            <guid>https://www.tenable.com/plugins/nessus/299434</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299434 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14,     from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time     the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not     affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the     host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host     and the TLS configuration for one of those hosts did not require client certificate authentication but     another one did, it was possible for a client to bypass the client certificate authentication by sending     different host names in the SNI extension and the HTTP host header field. The vulnerability only applies     if client certificate authentication is only enforced at the Connector. It does not apply if client     certificate authentication is enforced at the web application. Users are recommended to upgrade to version     11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue. (CVE-2025-66614)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299434">https://www.tenable.com/plugins/nessus/299434</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0.M7 < 10.1.52]]></title>
            <link>https://www.tenable.com/plugins/nessus/299410</link>
            <guid>https://www.tenable.com/plugins/nessus/299410</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299410 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by a vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Tomcat installed on the remote host is prior to 10.1.52. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.52_security-10 advisory.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP     responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification     or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This     issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat:<br /></span><span>    from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following     versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through     1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are     recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat     users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which     fix the issue. (CVE-2026-24734)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.52 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299410">https://www.tenable.com/plugins/nessus/299410</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0.M1 < 11.0.15 multiple vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/299403</link>
            <guid>https://www.tenable.com/plugins/nessus/299403</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299403 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by multiple vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Tomcat installed on the remote host is prior to 11.0.15. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_11.0.15_security-11 advisory.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14,     from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time     the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not     affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the     host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host     and the TLS configuration for one of those hosts did not require client certificate authentication but     another one did, it was possible for a client to bypass the client certificate authentication by sending     different host names in the SNI extension and the HTTP host header field. The vulnerability only applies     if client certificate authentication is only enforced at the Connector. It does not apply if client     certificate authentication is enforced at the web application. Users are recommended to upgrade to version     11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue. (CVE-2025-66614)<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the     GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests,     the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request     using HTTP/0.9. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through     10.1.49, from 9.0.0.M1 through 9.0.112. Older, EOL versions are also affected. Users are recommended to     upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.<br /></span><span>    (CVE-2026-24733)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.15 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299403">https://www.tenable.com/plugins/nessus/299403</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.83 < 9.0.115]]></title>
            <link>https://www.tenable.com/plugins/nessus/299402</link>
            <guid>https://www.tenable.com/plugins/nessus/299402</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299402 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by a vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Tomcat installed on the remote host is prior to 9.0.115. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_9.0.115_security-9 advisory.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP     responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification     or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This     issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat:<br /></span><span>    from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following     versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through     1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are     recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat     users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which     fix the issue. (CVE-2026-24734)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.115 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299402">https://www.tenable.com/plugins/nessus/299402</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 10.1.0.M1 < 10.1.50 multiple vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/299401</link>
            <guid>https://www.tenable.com/plugins/nessus/299401</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299401 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by multiple vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Tomcat installed on the remote host is prior to 10.1.50. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_10.1.50_security-10 advisory.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14,     from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time     the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not     affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the     host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host     and the TLS configuration for one of those hosts did not require client certificate authentication but     another one did, it was possible for a client to bypass the client certificate authentication by sending     different host names in the SNI extension and the HTTP host header field. The vulnerability only applies     if client certificate authentication is only enforced at the Connector. It does not apply if client     certificate authentication is enforced at the web application. Users are recommended to upgrade to version     11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue. (CVE-2025-66614)<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the     GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests,     the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request     using HTTP/0.9. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through     10.1.49, from 9.0.0.M1 through 9.0.112. Older, EOL versions are also affected. Users are recommended to     upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.<br /></span><span>    (CVE-2026-24733)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 10.1.50 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299401">https://www.tenable.com/plugins/nessus/299401</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 11.0.0.M1 < 11.0.18]]></title>
            <link>https://www.tenable.com/plugins/nessus/299398</link>
            <guid>https://www.tenable.com/plugins/nessus/299398</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299398 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by a vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Tomcat installed on the remote host is prior to 11.0.18. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_11.0.18_security-11 advisory.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP     responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification     or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This     issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat:<br /></span><span>    from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following     versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through     1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are     recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat     users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which     fix the issue. (CVE-2026-24734)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 11.0.18 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299398">https://www.tenable.com/plugins/nessus/299398</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache Tomcat 9.0.0.M1 < 9.0.113 multiple vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/299397</link>
            <guid>https://www.tenable.com/plugins/nessus/299397</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299397 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache Tomcat server is affected by multiple vulnerabilities<br /></span>
      <h3>Description</h3>
      <span>The version of Tomcat installed on the remote host is prior to 9.0.113. It is, therefore, affected by multiple vulnerabilities as referenced in the fixed_in_apache_tomcat_9.0.113_security-9 advisory.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14,     from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time     the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not     affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the     host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host     and the TLS configuration for one of those hosts did not require client certificate authentication but     another one did, it was possible for a client to bypass the client certificate authentication by sending     different host names in the SNI extension and the HTTP host header field. The vulnerability only applies     if client certificate authentication is only enforced at the Connector. It does not apply if client     certificate authentication is enforced at the web application. Users are recommended to upgrade to version     11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue. (CVE-2025-66614)<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the     GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests,     the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request     using HTTP/0.9. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through     10.1.49, from 9.0.0.M1 through 9.0.112. Older, EOL versions are also affected. Users are recommended to     upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.<br /></span><span>    (CVE-2026-24733)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apache Tomcat version 9.0.113 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299397">https://www.tenable.com/plugins/nessus/299397</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-24734]]></title>
            <link>https://www.tenable.com/plugins/nessus/299376</link>
            <guid>https://www.tenable.com/plugins/nessus/299376</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299376 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP     responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification     or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This     issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat:<br /></span><span>    from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following     versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through     1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are     recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat     users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which     fix the issue. (CVE-2026-24734)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299376">https://www.tenable.com/plugins/nessus/299376</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[openSUSE 15 Security Update : libxml2 (SUSE-SU-2026:0568-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299355</link>
            <guid>https://www.tenable.com/plugins/nessus/299355</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299355 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote openSUSE host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote openSUSE 15 host has a package installed that is affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:0568-1 advisory.<br /></span><span><br /></span><span>    - CVE-2026-0990: Fixed a call stack overflow leading to application crash due to infinite recursion in     `xmlCatalogXMLResolveURI`. (bsc#1256807, bsc#1256811)<br /></span><span>    - CVE-2026-0992: Fixed an excessive resource consumption when processing XML catalogs due to exponential     behavior. (bsc#1256809, bsc#1256812)<br /></span><span>    - CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell. (bsc#1257594, bsc#1257595)<br /></span><span>    - CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT. (bsc#1250553)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python3-libxml2-python package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299355">https://www.tenable.com/plugins/nessus/299355</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2447]]></title>
            <link>https://www.tenable.com/plugins/nessus/299233</link>
            <guid>https://www.tenable.com/plugins/nessus/299233</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299233 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1,     Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2. (CVE-2026-2447)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299233">https://www.tenable.com/plugins/nessus/299233</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-26076]]></title>
            <link>https://www.tenable.com/plugins/nessus/299023</link>
            <guid>https://www.tenable.com/plugins/nessus/299023</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299023 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ntpd-rs is a full-featured implementation of the Network Time Protocol. Prior to 1.7.1, an attacker can     remotely induce moderate increases (2-4 times above normal) in cpu usage. When having NTS enabled on an     ntpd-rs server, an attacker can create malformed NTS packets that take significantly more effort for the     server to respond to by requesting a large number of cookies. This can lead to degraded server performance     even when a server could otherwise handle the load. This vulnerability is fixed in 1.7.1. (CVE-2026-26076)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299023">https://www.tenable.com/plugins/nessus/299023</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 9 : keylime (RLSA-2026:2224)]]></title>
            <link>https://www.tenable.com/plugins/nessus/299001</link>
            <guid>https://www.tenable.com/plugins/nessus/299001</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299001 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 9 host has packages installed that are affected by a vulnerability as referenced in the RLSA-2026:2224 advisory.<br /></span><span><br /></span><span>    * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing     client-side TLS authentication (CVE-2026-1709)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299001">https://www.tenable.com/plugins/nessus/299001</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : expat -- multiple vulnerabilities (027c6c07-065b-11f1-baae-589cfc023192)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298957</link>
            <guid>https://www.tenable.com/plugins/nessus/298957</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298957 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 027c6c07-065b-11f1-baae-589cfc023192 advisory.<br /></span><span><br /></span><span>    expat team reports:<br /></span><span>    Update contains 2 security fixes:<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298957">https://www.tenable.com/plugins/nessus/298957</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 9 : keylime (ALSA-2026:2224)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298849</link>
            <guid>https://www.tenable.com/plugins/nessus/298849</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298849 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 9 host has packages installed that are affected by a vulnerability as referenced in the ALSA-2026:2224 advisory.<br /></span><span><br /></span><span>    * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing     client-side TLS authentication (CVE-2026-1709)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298849">https://www.tenable.com/plugins/nessus/298849</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS : xmltok library vulnerabilities (USN-8023-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298808</link>
            <guid>https://www.tenable.com/plugins/nessus/298808</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298808 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 24.04 LTS host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8023-1 advisory.<br /></span><span><br /></span><span>    It was discovered that Expat, contained within the xmltok library, incorrectly handled the initialization     of parsers for external entities. An attacker could possibly use this issue to cause a denial of service.<br /></span><span>    (CVE-2026-24515)<br /></span><span><br /></span><span>    It was discovered that Expat, contained within the xmltok library, incorrectly handled integer     calculations when allocating memory for XML tags. An attacker could possibly use this issue to cause a     denial of service or execute arbitrary code. (CVE-2026-25210)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected libxmltok1, libxmltok1-dev and / or libxmltok1t64 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298808">https://www.tenable.com/plugins/nessus/298808</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 25.10 : Expat vulnerabilities (USN-8022-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298805</link>
            <guid>https://www.tenable.com/plugins/nessus/298805</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298805 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 20.04 LTS / 22.04 LTS / 25.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-8022-1 advisory.<br /></span><span><br /></span><span>    It was discovered that Expat incorrectly handled memory when parsing certain XML files. An attacker could     possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 25.10.<br /></span><span>    (CVE-2025-59375)<br /></span><span><br /></span><span>    It was discovered that Expat incorrectly handled the initialization of parsers for external entities. An     attacker could possibly use this issue to cause a denial of service. (CVE-2026-24515)<br /></span><span><br /></span><span>    It was discovered that Expat incorrectly handled integer calculations when allocating memory for XML tags.<br /></span><span>    An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.<br /></span><span>    (CVE-2026-25210)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298805">https://www.tenable.com/plugins/nessus/298805</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MiracleLinux 9 : keylime-7.12.1-11.el9_7.4 (AXSA:2026-165:01)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298753</link>
            <guid>https://www.tenable.com/plugins/nessus/298753</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298753 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote MiracleLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote MiracleLinux 9 host has packages installed that are affected by a vulnerability as referenced in the AXSA:2026-165:01 advisory.<br /></span><span><br /></span><span>    * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing     client-side TLS authentication (CVE-2026-1709)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the MiracleLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298753">https://www.tenable.com/plugins/nessus/298753</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dla-4476 : linux-config-6.1 - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/298659</link>
            <guid>https://www.tenable.com/plugins/nessus/298659</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298659 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4476 advisory.<br /></span><span><br /></span><span>    -------------------------------------------------------------------------     Debian LTS Advisory DLA-4476-1                debian-lts@lists.debian.org     https://www.debian.org/lts/security/                        Ben Hutchings     February 10, 2026                             https://wiki.debian.org/LTS<br /></span><span>    -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : linux-6.1     Version        : 6.1.162-1~deb11u1     CVE ID         : CVE-2023-52658 CVE-2023-53421 CVE-2023-54285 CVE-2024-42079                      CVE-2024-46786 CVE-2024-49968 CVE-2025-21946 CVE-2025-22022                      CVE-2025-22083 CVE-2025-22090 CVE-2025-22107 CVE-2025-22111                      CVE-2025-22121 CVE-2025-37926 CVE-2025-38022 CVE-2025-38104                      CVE-2025-38125 CVE-2025-38129 CVE-2025-38232 CVE-2025-38361                      CVE-2025-38408 CVE-2025-38591 CVE-2025-38718 CVE-2025-39721                      CVE-2025-39871 CVE-2025-40039 CVE-2025-40110 CVE-2025-40149                      CVE-2025-40164 CVE-2025-40215 CVE-2025-68211 CVE-2025-68223                      CVE-2025-68254 CVE-2025-68255 CVE-2025-68256 CVE-2025-68257                      CVE-2025-68258 CVE-2025-68259 CVE-2025-68261 CVE-2025-68263                      CVE-2025-68264 CVE-2025-68266 CVE-2025-68291 CVE-2025-68325                      CVE-2025-68332 CVE-2025-68335 CVE-2025-68336 CVE-2025-68337                      CVE-2025-68340 CVE-2025-68344 CVE-2025-68345 CVE-2025-68346                      CVE-2025-68347 CVE-2025-68349 CVE-2025-68354 CVE-2025-68362                      CVE-2025-68363 CVE-2025-68364 CVE-2025-68365 CVE-2025-68366                      CVE-2025-68367 CVE-2025-68369 CVE-2025-68371 CVE-2025-68372                      CVE-2025-68380 CVE-2025-68724 CVE-2025-68725 CVE-2025-68727                      CVE-2025-68728 CVE-2025-68732 CVE-2025-68733 CVE-2025-68740                      CVE-2025-68742 CVE-2025-68746 CVE-2025-68753 CVE-2025-68757                      CVE-2025-68758 CVE-2025-68759 CVE-2025-68764 CVE-2025-68765                      CVE-2025-68766 CVE-2025-68767 CVE-2025-68769 CVE-2025-68771                      CVE-2025-68772 CVE-2025-68773 CVE-2025-68774 CVE-2025-68776                      CVE-2025-68777 CVE-2025-68778 CVE-2025-68780 CVE-2025-68781                      CVE-2025-68782 CVE-2025-68783 CVE-2025-68785 CVE-2025-68786                      CVE-2025-68787 CVE-2025-68788 CVE-2025-68795 CVE-2025-68796                      CVE-2025-68797 CVE-2025-68798 CVE-2025-68799 CVE-2025-68800                      CVE-2025-68801 CVE-2025-68803 CVE-2025-68804 CVE-2025-68806                      CVE-2025-68808 CVE-2025-68813 CVE-2025-68814 CVE-2025-68815                      CVE-2025-68816 CVE-2025-68817 CVE-2025-68818 CVE-2025-68819                      CVE-2025-68820 CVE-2025-68821 CVE-2025-71064 CVE-2025-71066                      CVE-2025-71069 CVE-2025-71071 CVE-2025-71075 CVE-2025-71077                      CVE-2025-71078 CVE-2025-71079 CVE-2025-71081 CVE-2025-71082                      CVE-2025-71083 CVE-2025-71084 CVE-2025-71085 CVE-2025-71086                      CVE-2025-71087 CVE-2025-71088 CVE-2025-71091 CVE-2025-71093                      CVE-2025-71094 CVE-2025-71095 CVE-2025-71096 CVE-2025-71097                      CVE-2025-71098 CVE-2025-71102 CVE-2025-71104 CVE-2025-71105                      CVE-2025-71108 CVE-2025-71111 CVE-2025-71112 CVE-2025-71113                      CVE-2025-71114 CVE-2025-71116 CVE-2025-71118 CVE-2025-71119                      CVE-2025-71120 CVE-2025-71121 CVE-2025-71123 CVE-2025-71125                      CVE-2025-71126 CVE-2025-71127 CVE-2025-71130 CVE-2025-71131                      CVE-2025-71132 CVE-2025-71133 CVE-2025-71136 CVE-2025-71137                      CVE-2025-71147 CVE-2025-71149 CVE-2025-71150 CVE-2025-71154                      CVE-2025-71162 CVE-2025-71163 CVE-2025-71180 CVE-2025-71182                      CVE-2025-71183 CVE-2025-71185 CVE-2025-71186 CVE-2025-71189                      CVE-2025-71190 CVE-2025-71191 CVE-2025-71192 CVE-2025-71194                      CVE-2025-71196 CVE-2025-71197 CVE-2025-71199 CVE-2026-22976                      CVE-2026-22977 CVE-2026-22978 CVE-2026-22979 CVE-2026-22980                      CVE-2026-22982 CVE-2026-22984 CVE-2026-22990 CVE-2026-22991                      CVE-2026-22992 CVE-2026-22994 CVE-2026-22997 CVE-2026-22998                      CVE-2026-22999 CVE-2026-23001 CVE-2026-23003 CVE-2026-23005                      CVE-2026-23006 CVE-2026-23010 CVE-2026-23011 CVE-2026-23019                      CVE-2026-23020 CVE-2026-23021 CVE-2026-23025 CVE-2026-23026                      CVE-2026-23030 CVE-2026-23031 CVE-2026-23033 CVE-2026-23037                      CVE-2026-23038 CVE-2026-23047 CVE-2026-23049 CVE-2026-23054                      CVE-2026-23056 CVE-2026-23058 CVE-2026-23060 CVE-2026-23061                      CVE-2026-23063 CVE-2026-23064 CVE-2026-23068 CVE-2026-23069                      CVE-2026-23071 CVE-2026-23073 CVE-2026-23074 CVE-2026-23075                      CVE-2026-23076 CVE-2026-23078 CVE-2026-23080 CVE-2026-23083                      CVE-2026-23084 CVE-2026-23085 CVE-2026-23086 CVE-2026-23087                      CVE-2026-23089 CVE-2026-23090 CVE-2026-23091 CVE-2026-23093                      CVE-2026-23095 CVE-2026-23096 CVE-2026-23097 CVE-2026-23098                      CVE-2026-23099 CVE-2026-23101 CVE-2026-23102 CVE-2026-23103                      CVE-2026-23105 CVE-2026-23107 CVE-2026-23108 CVE-2026-23110     Debian Bug     : 1121535 1122193<br /></span><span><br /></span><span>    Several vulnerabilities have been discovered in the Linux kernel that     may lead to a privilege escalation, denial of service or information     leaks.<br /></span><span><br /></span><span>    For Debian 11 bullseye, these problems have been fixed in version     6.1.162-1~deb11u1.  This update also fixes several bugs reported to     Debian.  It additionally includes many more bug fixes from stable     updates 6.1.160-6.1.162 inclusive.<br /></span><span><br /></span><span>    We recommend that you upgrade your linux-6.1 packages.<br /></span><span><br /></span><span>    For the detailed security status of linux-6.1 please refer to     its security tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/linux-6.1<br /></span><span><br /></span><span>    Further information about Debian LTS security advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://wiki.debian.org/LTS     Attachment:<br /></span><span>    signature.asc     Description: PGP signature<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the linux-config-6.1 packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298659">https://www.tenable.com/plugins/nessus/298659</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : FreeBSD -- blocklistd(8) socket leak (8d8012e5-0705-11f1-8148-bc241121aa0a)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298643</link>
            <guid>https://www.tenable.com/plugins/nessus/298643</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298643 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 8d8012e5-0705-11f1-8148-bc241121aa0a advisory.<br /></span><span><br /></span><span>    Due to a programming error, blocklistd leaks a socket descriptor             for each adverse event report it receives.<br /></span><span>    Once a certain number of leaked sockets is reached, blocklistd             becomes unable to run the helper script: a child process is forked,             but this child dereferences a null pointer and crashes before it             is able to exec the helper.  At this point, blocklistd still records             adverse events but is unable to block new addresses or unblock             addresses whose database entries have expired.<br /></span><span>    Once a second, much higher number of leaked sockets is reached,             blocklistd becomes unable to receive new adverse event reports.<br /></span><span>    An attacker may take advantage of this by triggering a large             number of adverse events from sacrificial IP addresses to effectively             disable blocklistd before launching an attack.<br /></span><span>    Even in the absence of attacks or probes by would-be attackers,             adverse events will occur regularly in the course of normal operations,             and blocklistd will gradually run out file descriptors and become             ineffective.<br /></span><span>    The accumulation of open sockets may have knock-on effects on other             parts of the system, resulting in a general slowdown until blocklistd             is restarted.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298643">https://www.tenable.com/plugins/nessus/298643</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 10 : keylime (RLSA-2026:2225)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298617</link>
            <guid>https://www.tenable.com/plugins/nessus/298617</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298617 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 10 host has packages installed that are affected by a vulnerability as referenced in the RLSA-2026:2225 advisory.<br /></span><span><br /></span><span>    * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing     client-side TLS authentication (CVE-2026-1709)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298617">https://www.tenable.com/plugins/nessus/298617</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-26007]]></title>
            <link>https://www.tenable.com/plugins/nessus/298585</link>
            <guid>https://www.tenable.com/plugins/nessus/298585</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298585 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.<br /></span><span>    Prior to 46.0.5, the public_key_from_numbers (or EllipticCurvePublicNumbers.public_key()),     EllipticCurvePublicNumbers.public_key(), load_der_public_key() and load_pem_public_key() functions do not     verify that the point belongs to the expected prime-order subgroup of the curve. This missing validation     allows an attacker to provide a public key point P from a small-order subgroup. This can lead to security     issues in various situations, such as the most commonly used signature verification (ECDSA) and shared key     negotiation (ECDH). When the victim computes the shared secret as S = [victim_private_key]P via ECDH, this     leaks information about victim_private_key mod (small_subgroup_order). For curves with cofactor > 1, this     reveals the least significant bits of the private key. When these weak public keys are used in ECDSA ,     it's easy to forge signatures on the small subgroup. Only SECT curves are impacted by this. This     vulnerability is fixed in 46.0.5. (CVE-2026-26007)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298585">https://www.tenable.com/plugins/nessus/298585</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AlmaLinux 10 : keylime (ALSA-2026:2225)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298469</link>
            <guid>https://www.tenable.com/plugins/nessus/298469</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298469 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote AlmaLinux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote AlmaLinux 10 host has packages installed that are affected by a vulnerability as referenced in the ALSA-2026:2225 advisory.<br /></span><span><br /></span><span>    * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing     client-side TLS authentication (CVE-2026-1709)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the AlmaLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298469">https://www.tenable.com/plugins/nessus/298469</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-25646]]></title>
            <link>https://www.tenable.com/plugins/nessus/298457</link>
            <guid>https://www.tenable.com/plugins/nessus/298457</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298457 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable     Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the     png_set_quantize() API function. When the function is called with no histogram and the number of colors in     the palette is more than twice the maximum supported by the user's display, certain palettes will cause     the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer.<br /></span><span>    The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is     fixed in 1.6.55. (CVE-2026-25646)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298457">https://www.tenable.com/plugins/nessus/298457</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-25934]]></title>
            <link>https://www.tenable.com/plugins/nessus/298456</link>
            <guid>https://www.tenable.com/plugins/nessus/298456</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298456 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - go-git is a highly extensible git implementation library written in pure Go. Prior to 5.16.5, a     vulnerability was discovered in go-git whereby data integrity values for .pack and .idx files were not     properly verified. This resulted in go-git potentially consuming corrupted files, which would likely     result in unexpected errors such as object not found. For context, clients fetch packfiles from upstream     Git servers. Those files contain a checksum of their contents, so that clients can perform integrity     checks before consuming it. The pack indexes (.idx) are generated locally by go-git, or the git cli, when     new .pack files are received and processed. The integrity checks for both files were not being verified     correctly. This vulnerability is fixed in 5.16.5. (CVE-2026-25934)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298456">https://www.tenable.com/plugins/nessus/298456</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 10 : keylime (ELSA-2026-2225)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298411</link>
            <guid>https://www.tenable.com/plugins/nessus/298411</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298411 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 10 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2026-2225 advisory.<br /></span><span><br /></span><span>    - CVE-2026-1709: Registrar authentication bypass<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298411">https://www.tenable.com/plugins/nessus/298411</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 9 : keylime (ELSA-2026-2224)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298410</link>
            <guid>https://www.tenable.com/plugins/nessus/298410</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298410 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 9 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2026-2224 advisory.<br /></span><span><br /></span><span>    [7.12.1-11.4]<br /></span><span>    - CVE-2026-1709: Registrar authentication bypass       Resolves: RHEL-145390<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298410">https://www.tenable.com/plugins/nessus/298410</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-6127 : affs-modules-6.1.0-37-4kc-malta-di - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/298404</link>
            <guid>https://www.tenable.com/plugins/nessus/298404</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298404 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6127 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-6127-1                   security@debian.org     https://www.debian.org/security/                     Salvatore Bonaccorso     February 09, 2026                     https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : linux     CVE ID         : CVE-2023-52658 CVE-2023-53421 CVE-2023-54285 CVE-2024-42079                      CVE-2024-46786 CVE-2024-49968 CVE-2025-21946 CVE-2025-22022                      CVE-2025-22083 CVE-2025-22090 CVE-2025-22107 CVE-2025-22111                      CVE-2025-22121 CVE-2025-37926 CVE-2025-38022 CVE-2025-38104                      CVE-2025-38125 CVE-2025-38129 CVE-2025-38232 CVE-2025-38361                      CVE-2025-38408 CVE-2025-38591 CVE-2025-38718 CVE-2025-39721                      CVE-2025-39871 CVE-2025-40039 CVE-2025-40110 CVE-2025-40149                      CVE-2025-40164 CVE-2025-40215 CVE-2025-68211 CVE-2025-68223                      CVE-2025-68254 CVE-2025-68255 CVE-2025-68256 CVE-2025-68257                      CVE-2025-68258 CVE-2025-68259 CVE-2025-68261 CVE-2025-68263                      CVE-2025-68264 CVE-2025-68266 CVE-2025-68291 CVE-2025-68325                      CVE-2025-68332 CVE-2025-68335 CVE-2025-68336 CVE-2025-68337                      CVE-2025-68340 CVE-2025-68344 CVE-2025-68345 CVE-2025-68346                      CVE-2025-68347 CVE-2025-68349 CVE-2025-68354 CVE-2025-68362                      CVE-2025-68363 CVE-2025-68364 CVE-2025-68365 CVE-2025-68366                      CVE-2025-68367 CVE-2025-68369 CVE-2025-68371 CVE-2025-68372                      CVE-2025-68380 CVE-2025-68724 CVE-2025-68725 CVE-2025-68727                      CVE-2025-68728 CVE-2025-68732 CVE-2025-68733 CVE-2025-68740                      CVE-2025-68742 CVE-2025-68746 CVE-2025-68753 CVE-2025-68757                      CVE-2025-68758 CVE-2025-68759 CVE-2025-68764 CVE-2025-68765                      CVE-2025-68766 CVE-2025-68767 CVE-2025-68769 CVE-2025-68771                      CVE-2025-68772 CVE-2025-68773 CVE-2025-68774 CVE-2025-68776                      CVE-2025-68777 CVE-2025-68778 CVE-2025-68780 CVE-2025-68781                      CVE-2025-68782 CVE-2025-68783 CVE-2025-68785 CVE-2025-68786                      CVE-2025-68787 CVE-2025-68788 CVE-2025-68789 CVE-2025-68795                      CVE-2025-68796 CVE-2025-68797 CVE-2025-68798 CVE-2025-68799                      CVE-2025-68800 CVE-2025-68801 CVE-2025-68803 CVE-2025-68804                      CVE-2025-68806 CVE-2025-68808 CVE-2025-68813 CVE-2025-68814                      CVE-2025-68815 CVE-2025-68816 CVE-2025-68817 CVE-2025-68818                      CVE-2025-68819 CVE-2025-68820 CVE-2025-68821 CVE-2025-71064                      CVE-2025-71066 CVE-2025-71069 CVE-2025-71071 CVE-2025-71075                      CVE-2025-71077 CVE-2025-71078 CVE-2025-71079 CVE-2025-71081                      CVE-2025-71082 CVE-2025-71083 CVE-2025-71084 CVE-2025-71085                      CVE-2025-71086 CVE-2025-71087 CVE-2025-71088 CVE-2025-71091                      CVE-2025-71093 CVE-2025-71094 CVE-2025-71095 CVE-2025-71096                      CVE-2025-71097 CVE-2025-71098 CVE-2025-71102 CVE-2025-71104                      CVE-2025-71105 CVE-2025-71108 CVE-2025-71111 CVE-2025-71112                      CVE-2025-71113 CVE-2025-71114 CVE-2025-71116 CVE-2025-71118                      CVE-2025-71119 CVE-2025-71120 CVE-2025-71121 CVE-2025-71123                      CVE-2025-71125 CVE-2025-71126 CVE-2025-71127 CVE-2025-71130                      CVE-2025-71131 CVE-2025-71132 CVE-2025-71133 CVE-2025-71136                      CVE-2025-71137 CVE-2025-71147 CVE-2025-71149 CVE-2025-71150                      CVE-2025-71154 CVE-2025-71162 CVE-2025-71163 CVE-2025-71180                      CVE-2025-71182 CVE-2025-71183 CVE-2025-71185 CVE-2025-71186                      CVE-2025-71189 CVE-2025-71190 CVE-2025-71191 CVE-2025-71192                      CVE-2025-71194 CVE-2025-71196 CVE-2025-71197 CVE-2025-71199                      CVE-2026-22976 CVE-2026-22977 CVE-2026-22978 CVE-2026-22979                      CVE-2026-22980 CVE-2026-22982 CVE-2026-22984 CVE-2026-22990                      CVE-2026-22991 CVE-2026-22992 CVE-2026-22994 CVE-2026-22997                      CVE-2026-22998 CVE-2026-22999 CVE-2026-23001 CVE-2026-23003                      CVE-2026-23005 CVE-2026-23006 CVE-2026-23010 CVE-2026-23011                      CVE-2026-23019 CVE-2026-23020 CVE-2026-23021 CVE-2026-23025                      CVE-2026-23026 CVE-2026-23030 CVE-2026-23031 CVE-2026-23033                      CVE-2026-23037 CVE-2026-23038 CVE-2026-23047 CVE-2026-23049                      CVE-2026-23054 CVE-2026-23056 CVE-2026-23058 CVE-2026-23060                      CVE-2026-23061 CVE-2026-23063 CVE-2026-23064 CVE-2026-23068                      CVE-2026-23069 CVE-2026-23071 CVE-2026-23073 CVE-2026-23074                      CVE-2026-23075 CVE-2026-23076 CVE-2026-23078 CVE-2026-23080                      CVE-2026-23083 CVE-2026-23084 CVE-2026-23085 CVE-2026-23086                      CVE-2026-23087 CVE-2026-23089 CVE-2026-23090 CVE-2026-23091                      CVE-2026-23093 CVE-2026-23095 CVE-2026-23096 CVE-2026-23097                      CVE-2026-23098 CVE-2026-23099 CVE-2026-23101 CVE-2026-23102                      CVE-2026-23103 CVE-2026-23105 CVE-2026-23107 CVE-2026-23108                      CVE-2026-23110<br /></span><span><br /></span><span>    Several vulnerabilities have been discovered in the Linux kernel that     may lead to a privilege escalation, denial of service or information     leaks.<br /></span><span><br /></span><span>    For the oldstable distribution (bookworm), these problems have been fixed     in version 6.1.162-1.<br /></span><span><br /></span><span>    We recommend that you upgrade your linux packages.<br /></span><span><br /></span><span>    For the detailed security status of linux please refer to its security     tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/linux<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the affs-modules-6.1.0-37-4kc-malta-di packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298404">https://www.tenable.com/plugins/nessus/298404</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-6126 : ata-modules-6.12.31-armmp-di - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/298403</link>
            <guid>https://www.tenable.com/plugins/nessus/298403</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298403 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 13 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6126 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-6126-1                   security@debian.org     https://www.debian.org/security/                     Salvatore Bonaccorso     February 09, 2026                     https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : linux     CVE ID         : CVE-2024-58096 CVE-2024-58097 CVE-2025-22111 CVE-2025-38234                      CVE-2025-38248 CVE-2025-38591 CVE-2025-39872 CVE-2025-40149                      CVE-2025-40164 CVE-2025-40170 CVE-2025-40276 CVE-2025-40325                      CVE-2025-68206 CVE-2025-68333 CVE-2025-68345 CVE-2025-68351                      CVE-2025-68357 CVE-2025-68358 CVE-2025-68365 CVE-2025-68725                      CVE-2025-68749 CVE-2025-68767 CVE-2025-68769 CVE-2025-68770                      CVE-2025-68771 CVE-2025-68772 CVE-2025-68773 CVE-2025-68774                      CVE-2025-68775 CVE-2025-68776 CVE-2025-68777 CVE-2025-68778                      CVE-2025-68780 CVE-2025-68781 CVE-2025-68782 CVE-2025-68783                      CVE-2025-68784 CVE-2025-68785 CVE-2025-68786 CVE-2025-68787                      CVE-2025-68788 CVE-2025-68789 CVE-2025-68792 CVE-2025-68794                      CVE-2025-68795 CVE-2025-68796 CVE-2025-68797 CVE-2025-68798                      CVE-2025-68799 CVE-2025-68800 CVE-2025-68801 CVE-2025-68802                      CVE-2025-68803 CVE-2025-68804 CVE-2025-68806 CVE-2025-68808                      CVE-2025-68809 CVE-2025-68810 CVE-2025-68811 CVE-2025-68813                      CVE-2025-68814 CVE-2025-68815 CVE-2025-68816 CVE-2025-68817                      CVE-2025-68818 CVE-2025-68819 CVE-2025-68820 CVE-2025-68821                      CVE-2025-68822 CVE-2025-71064 CVE-2025-71065 CVE-2025-71066                      CVE-2025-71067 CVE-2025-71068 CVE-2025-71069 CVE-2025-71071                      CVE-2025-71072 CVE-2025-71073 CVE-2025-71075 CVE-2025-71076                      CVE-2025-71077 CVE-2025-71078 CVE-2025-71079 CVE-2025-71080                      CVE-2025-71081 CVE-2025-71082 CVE-2025-71083 CVE-2025-71084                      CVE-2025-71085 CVE-2025-71086 CVE-2025-71087 CVE-2025-71088                      CVE-2025-71089 CVE-2025-71091 CVE-2025-71093 CVE-2025-71094                      CVE-2025-71095 CVE-2025-71096 CVE-2025-71097 CVE-2025-71098                      CVE-2025-71099 CVE-2025-71100 CVE-2025-71101 CVE-2025-71102                      CVE-2025-71104 CVE-2025-71105 CVE-2025-71107 CVE-2025-71108                      CVE-2025-71109 CVE-2025-71111 CVE-2025-71112 CVE-2025-71113                      CVE-2025-71114 CVE-2025-71116 CVE-2025-71118 CVE-2025-71119                      CVE-2025-71120 CVE-2025-71121 CVE-2025-71122 CVE-2025-71123                      CVE-2025-71125 CVE-2025-71126 CVE-2025-71127 CVE-2025-71129                      CVE-2025-71130 CVE-2025-71131 CVE-2025-71132 CVE-2025-71133                      CVE-2025-71134 CVE-2025-71135 CVE-2025-71136 CVE-2025-71137                      CVE-2025-71138 CVE-2025-71140 CVE-2025-71143 CVE-2025-71144                      CVE-2025-71146 CVE-2025-71147 CVE-2025-71148 CVE-2025-71149                      CVE-2025-71150 CVE-2025-71151 CVE-2025-71153 CVE-2025-71154                      CVE-2025-71156 CVE-2025-71157 CVE-2025-71160 CVE-2025-71162                      CVE-2025-71163 CVE-2025-71180 CVE-2025-71182 CVE-2025-71183                      CVE-2025-71184 CVE-2025-71185 CVE-2025-71186 CVE-2025-71189                      CVE-2025-71190 CVE-2025-71191 CVE-2025-71192 CVE-2025-71193                      CVE-2025-71194 CVE-2025-71195 CVE-2025-71196 CVE-2025-71197                      CVE-2025-71198 CVE-2025-71199 CVE-2026-22976 CVE-2026-22977                      CVE-2026-22978 CVE-2026-22979 CVE-2026-22980 CVE-2026-22982                      CVE-2026-22984 CVE-2026-22989 CVE-2026-22990 CVE-2026-22991                      CVE-2026-22992 CVE-2026-22994 CVE-2026-22996 CVE-2026-22997                      CVE-2026-22998 CVE-2026-22999 CVE-2026-23000 CVE-2026-23001                      CVE-2026-23002 CVE-2026-23003 CVE-2026-23005 CVE-2026-23006                      CVE-2026-23010 CVE-2026-23011 CVE-2026-23013 CVE-2026-23019                      CVE-2026-23020 CVE-2026-23021 CVE-2026-23023 CVE-2026-23025                      CVE-2026-23026 CVE-2026-23030 CVE-2026-23031 CVE-2026-23032                      CVE-2026-23033 CVE-2026-23035 CVE-2026-23037 CVE-2026-23038                      CVE-2026-23047 CVE-2026-23049 CVE-2026-23050 CVE-2026-23053                      CVE-2026-23054 CVE-2026-23055 CVE-2026-23056 CVE-2026-23057                      CVE-2026-23058 CVE-2026-23059 CVE-2026-23060 CVE-2026-23061                      CVE-2026-23062 CVE-2026-23063 CVE-2026-23064 CVE-2026-23065                      CVE-2026-23068 CVE-2026-23069 CVE-2026-23071 CVE-2026-23072                      CVE-2026-23073 CVE-2026-23074 CVE-2026-23075 CVE-2026-23076                      CVE-2026-23078 CVE-2026-23080 CVE-2026-23083 CVE-2026-23084                      CVE-2026-23085 CVE-2026-23086 CVE-2026-23087 CVE-2026-23088                      CVE-2026-23089 CVE-2026-23090 CVE-2026-23091 CVE-2026-23093                      CVE-2026-23094 CVE-2026-23095 CVE-2026-23096 CVE-2026-23097                      CVE-2026-23098 CVE-2026-23099 CVE-2026-23101 CVE-2026-23103                      CVE-2026-23105 CVE-2026-23107 CVE-2026-23108 CVE-2026-23110<br /></span><span><br /></span><span>    Several vulnerabilities have been discovered in the Linux kernel that     may lead to a privilege escalation, denial of service or information     leaks.<br /></span><span><br /></span><span>    For the stable distribution (trixie), these problems have been fixed in     version 6.12.69-1.<br /></span><span><br /></span><span>    We recommend that you upgrade your linux packages.<br /></span><span><br /></span><span>    For the detailed security status of linux please refer to its security     tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/linux<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the ata-modules-6.12.31-armmp-di packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298403">https://www.tenable.com/plugins/nessus/298403</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : keylime (RHSA-2026:2298)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298378</link>
            <guid>https://www.tenable.com/plugins/nessus/298378</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298378 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for keylime.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:2298 advisory.<br /></span><span><br /></span><span>    Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing     client-side TLS authentication (CVE-2026-1709)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL keylime package based on the guidance in RHSA-2026:2298.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298378">https://www.tenable.com/plugins/nessus/298378</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : keylime (RHSA-2026:2224)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298376</link>
            <guid>https://www.tenable.com/plugins/nessus/298376</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298376 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for keylime.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:2224 advisory.<br /></span><span><br /></span><span>    Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing     client-side TLS authentication (CVE-2026-1709)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL keylime package based on the guidance in RHSA-2026:2224.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298376">https://www.tenable.com/plugins/nessus/298376</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : keylime (RHSA-2026:2225)]]></title>
            <link>https://www.tenable.com/plugins/nessus/298371</link>
            <guid>https://www.tenable.com/plugins/nessus/298371</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298371 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing a security update for keylime.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2026:2225 advisory.<br /></span><span><br /></span><span>    Keylime is a TPM based highly scalable remote boot attestation and runtime integrity measurement solution.<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * keylime: Keylime: Authentication bypass allows unauthorized administrative operations due to missing     client-side TLS authentication (CVE-2026-1709)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL keylime package based on the guidance in RHSA-2026:2225.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298371">https://www.tenable.com/plugins/nessus/298371</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Photon OS 5.0: Expat PHSA-2026-5.0-0756]]></title>
            <link>https://www.tenable.com/plugins/nessus/298353</link>
            <guid>https://www.tenable.com/plugins/nessus/298353</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298353 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote PhotonOS host is missing multiple security updates.<br /></span>
      <h3>Description</h3>
      <span>An update of the expat package has been released.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected Linux packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298353">https://www.tenable.com/plugins/nessus/298353</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-58190]]></title>
            <link>https://www.tenable.com/plugins/nessus/298280</link>
            <guid>https://www.tenable.com/plugins/nessus/298280</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298280 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain     inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.<br /></span><span>    (CVE-2025-58190)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298280">https://www.tenable.com/plugins/nessus/298280</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-47911]]></title>
            <link>https://www.tenable.com/plugins/nessus/298274</link>
            <guid>https://www.tenable.com/plugins/nessus/298274</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 298274 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain     inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.<br /></span><span>    (CVE-2025-47911)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/298274">https://www.tenable.com/plugins/nessus/298274</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-21933]]></title>
            <link>https://www.tenable.com/plugins/nessus/297695</link>
            <guid>https://www.tenable.com/plugins/nessus/297695</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 297695 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of     Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u471,     8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9;<br /></span><span>    Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated     attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK,     Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than     the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM     Enterprise Edition, attacks may significantly impact additional products (scope change). Successful     attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle     Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized     read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition     accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g.,     through a web service which supplies data to the APIs. This vulnerability also applies to Java     deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets,     that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox     for security. (CVE-2026-21933)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/297695">https://www.tenable.com/plugins/nessus/297695</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54024]]></title>
            <link>https://www.tenable.com/plugins/nessus/279968</link>
            <guid>https://www.tenable.com/plugins/nessus/279968</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279968 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - KVM: Destroy target device if coalesced MMIO unregistration fails Destroy and free the target coalesced     MMIO device if unregistering said device fails. As clearly noted in the code, kvm_io_bus_unregister_dev()     does not destroy the target device. BUG: memory leak unreferenced object 0xffff888112a54880 (size 64):<br /></span><span>    comm syz-executor.2, pid 5258, jiffies 4297861402 (age 14.129s) hex dump (first 32 bytes): 38 c7 67 15     00 c9 ff ff 38 c7 67 15 00 c9 ff ff 8.g.....8.g..... e0 c7 e1 83 ff ff ff ff 00 30 67 15 00 c9 ff ff     .........0g..... backtrace: [<0000000006995a8a>] kmalloc include/linux/slab.h:556 [inline]     [<0000000006995a8a>] kzalloc include/linux/slab.h:690 [inline] [<0000000006995a8a>]     kvm_vm_ioctl_register_coalesced_mmio+0x8e/0x3d0 arch/x86/kvm/../../../virt/kvm/coalesced_mmio.c:150     [<00000000022550c2>] kvm_vm_ioctl+0x47d/0x1600 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3323     [<000000008a75102f>] vfs_ioctl fs/ioctl.c:46 [inline] [<000000008a75102f>] file_ioctl fs/ioctl.c:509     [inline] [<000000008a75102f>] do_vfs_ioctl+0xbab/0x1160 fs/ioctl.c:696 [<0000000080e3f669>]     ksys_ioctl+0x76/0xa0 fs/ioctl.c:713 [<0000000059ef4888>] __do_sys_ioctl fs/ioctl.c:720 [inline]     [<0000000059ef4888>] __se_sys_ioctl fs/ioctl.c:718 [inline] [<0000000059ef4888>] __x64_sys_ioctl+0x6f/0xb0     fs/ioctl.c:718 [<000000006444fa05>] do_syscall_64+0x9f/0x4e0 arch/x86/entry/common.c:290     [<000000009a4ed50b>] entry_SYSCALL_64_after_hwframe+0x49/0xbe BUG: leak checking failed (CVE-2023-54024)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279968">https://www.tenable.com/plugins/nessus/279968</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54119]]></title>
            <link>https://www.tenable.com/plugins/nessus/279898</link>
            <guid>https://www.tenable.com/plugins/nessus/279898</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279898 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - inotify: Avoid reporting event with invalid wd When inotify_freeing_mark() races with     inotify_handle_inode_event() it can happen that inotify_handle_inode_event() sees that i_mark->wd got     already reset to -1 and reports this value to userspace which can confuse the inotify listener. Avoid the     problem by validating that wd is sensible (and pretend the mark got removed before the event got generated     otherwise). (CVE-2023-54119)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279898">https://www.tenable.com/plugins/nessus/279898</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2022-50781]]></title>
            <link>https://www.tenable.com/plugins/nessus/279895</link>
            <guid>https://www.tenable.com/plugins/nessus/279895</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279895 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table() In the PP_OD_EDIT_VDDC_CURVE case the     input_index variable is capped at 2 but not checked for negative values so it results in an out of     bounds read. This value comes from the user via sysfs. (CVE-2022-50781)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279895">https://www.tenable.com/plugins/nessus/279895</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54069]]></title>
            <link>https://www.tenable.com/plugins/nessus/279890</link>
            <guid>https://www.tenable.com/plugins/nessus/279890</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279890 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow When we calculate the end position of     ext4_free_extent, this position may be exactly where ext4_lblk_t (i.e. uint) overflows. For example, if     ac_g_ex.fe_logical is 4294965248 and ac_orig_goal_len is 2048, then the computed end is 0x100000000, which     is 0. If ac->ac_o_ex.fe_logical is not the first case of adjusting the best extent, that is, new_bex_end >     0, the following BUG_ON will be triggered: =========================================================     kernel BUG at fs/ext4/mballoc.c:5116! invalid opcode: 0000 [#1] PREEMPT SMP PTI CPU: 3 PID: 673 Comm:<br /></span><span>    xfs_io Tainted: G E 6.5.0-rc1+ #279 RIP: 0010:ext4_mb_new_inode_pa+0xc5/0x430 Call Trace: <TASK>     ext4_mb_use_best_found+0x203/0x2f0 ext4_mb_try_best_found+0x163/0x240     ext4_mb_regular_allocator+0x158/0x1550 ext4_mb_new_blocks+0x86a/0xe10 ext4_ext_map_blocks+0xb0c/0x13a0     ext4_map_blocks+0x2cd/0x8f0 ext4_iomap_begin+0x27b/0x400 iomap_iter+0x222/0x3d0 __iomap_dio_rw+0x243/0xcb0     iomap_dio_rw+0x16/0x80 ========================================================= A simple reproducer     demonstrating the problem: mkfs.ext4 -F /dev/sda -b 4096 100M mount /dev/sda /tmp/test fallocate -l1M     /tmp/test/tmp fallocate -l10M /tmp/test/file fallocate -i -o 1M -l16777203M /tmp/test/file fsstress -d     /tmp/test -l 0 -n 100000 -p 8 & sleep 10 && killall -9 fsstress rm -f /tmp/test/tmp xfs_io -c open -ad     /tmp/test/file -c pwrite -S 0xff 0 8192 We simply refactor the logic for adjusting the best extent by     adding a temporary ext4_free_extent ex and use extent_logical_end() to avoid overflow, which also     simplifies the code. (CVE-2023-54069)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279890">https://www.tenable.com/plugins/nessus/279890</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2022-50771]]></title>
            <link>https://www.tenable.com/plugins/nessus/279887</link>
            <guid>https://www.tenable.com/plugins/nessus/279887</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279887 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state() Running rcutorture with non-zero     fqs_duration module parameter in a kernel built with CONFIG_PREEMPTION=y results in the following splat:<br /></span><span>    BUG: using __this_cpu_read() in preemptible [00000000] code: rcu_torture_fqs/398 caller is<br /></span><span>    __this_cpu_preempt_check+0x13/0x20 CPU: 3 PID: 398 Comm: rcu_torture_fqs Not tainted 6.0.0-rc1-yoctodev-     standard+ Call Trace: <TASK> dump_stack_lvl+0x5b/0x86 dump_stack+0x10/0x16     check_preemption_disabled+0xe5/0xf0 __this_cpu_preempt_check+0x13/0x20     rcu_force_quiescent_state.part.0+0x1c/0x170 rcu_force_quiescent_state+0x1e/0x30 rcu_torture_fqs+0xca/0x160     ? rcu_torture_boost+0x430/0x430 kthread+0x192/0x1d0 ? kthread_complete_and_exit+0x30/0x30     ret_from_fork+0x22/0x30 </TASK> The problem is that rcu_force_quiescent_state() uses __this_cpu_read() in     preemptible code instead of the proper raw_cpu_read(). This commit therefore changes __this_cpu_read() to     raw_cpu_read(). (CVE-2022-50771)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279887">https://www.tenable.com/plugins/nessus/279887</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54095]]></title>
            <link>https://www.tenable.com/plugins/nessus/279885</link>
            <guid>https://www.tenable.com/plugins/nessus/279885</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279885 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - powerpc/iommu: Fix notifiers being shared by PCI and VIO buses fail_iommu_setup() registers the     fail_iommu_bus_notifier struct to both PCI and VIO buses. struct notifier_block is a linked list node, so     this causes any notifiers later registered to either bus type to also be registered to the other since     they share the same node. This causes issues in (at least) the vgaarb code, which registers a notifier for     PCI buses. pci_notify() ends up being called on a vio device, converted with to_pci_dev() even though it's     not a PCI device, and finally makes a bad access in vga_arbiter_add_pci_device() as discovered with KASAN:<br /></span><span>    BUG: KASAN: slab-out-of-bounds in vga_arbiter_add_pci_device+0x60/0xe00 Read of size 4 at addr     c000000264c26fdc by task swapper/0/1 Call Trace: dump_stack_lvl+0x1bc/0x2b8 (unreliable)     print_report+0x3f4/0xc60 kasan_report+0x244/0x698 __asan_load4+0xe8/0x250     vga_arbiter_add_pci_device+0x60/0xe00 pci_notify+0x88/0x444 notifier_call_chain+0x104/0x320     blocking_notifier_call_chain+0xa0/0x140 device_add+0xac8/0x1d30 device_register+0x58/0x80     vio_register_device_node+0x9ac/0xce0 vio_bus_scan_register_devices+0xc4/0x13c<br /></span><span>    __machine_initcall_pseries_vio_device_init+0x94/0xf0 do_one_initcall+0x12c/0xaa8     kernel_init_freeable+0xa48/0xba8 kernel_init+0x64/0x400 ret_from_kernel_thread+0x5c/0x64 Fix this by     creating separate notifier_block structs for each bus type. [mpe: Add #ifdef to fix CONFIG_IBMVIO=n build]     (CVE-2023-54095)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279885">https://www.tenable.com/plugins/nessus/279885</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54100]]></title>
            <link>https://www.tenable.com/plugins/nessus/279884</link>
            <guid>https://www.tenable.com/plugins/nessus/279884</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279884 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - scsi: qedi: Fix use after free bug in qedi_remove() In qedi_probe() we call __qedi_probe() which     initializes &qedi->recovery_work with qedi_recovery_handler() and &qedi->board_disable_work with     qedi_board_disable_work(). When qedi_schedule_recovery_handler() is called, schedule_delayed_work() will     finally start the work. In qedi_remove(), which is called to remove the driver, the following sequence may     be observed: Fix this by finishing the work before cleanup in qedi_remove(). CPU0 CPU1     |qedi_recovery_handler qedi_remove | __qedi_remove | iscsi_host_free | scsi_host_put | //free shost |     |iscsi_host_for_each_session |//use qedi->shost Cancel recovery_work and board_disable_work in<br /></span><span>    __qedi_remove(). (CVE-2023-54100)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279884">https://www.tenable.com/plugins/nessus/279884</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54117]]></title>
            <link>https://www.tenable.com/plugins/nessus/279883</link>
            <guid>https://www.tenable.com/plugins/nessus/279883</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279883 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - s390/dcssblk: fix kernel crash with list_add corruption Commit fb08a1908cb1 (dax: simplify the dax_device     <-> gendisk association) introduced new logic for gendisk association, requiring drivers to explicitly     call dax_add_host() and dax_remove_host(). For dcssblk driver, some dax_remove_host() calls were missing,     e.g. in device remove path. The commit also broke error handling for out_dax case in device add path,     resulting in an extra put_device() w/o the previous get_device() in that case. This lead to stale xarray     entries after device add / remove cycles. In the case when a previously used struct gendisk pointer     (xarray index) would be used again, because blk_alloc_disk() happened to return such a pointer, the     xa_insert() in dax_add_host() would fail and go to out_dax, doing the extra put_device() in the error     path. In combination with an already flawed error handling in dcssblk (device_register() cleanup), which     needs to be addressed in a separate patch, this resulted in a missing device_del() / klist_del(), and     eventually in the kernel crash with list_add corruption on a subsequent device_add() / klist_add(). Fix     this by adding the missing dax_remove_host() calls, and also move the put_device() in the error path to     restore the previous logic. (CVE-2023-54117)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279883">https://www.tenable.com/plugins/nessus/279883</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54096]]></title>
            <link>https://www.tenable.com/plugins/nessus/279872</link>
            <guid>https://www.tenable.com/plugins/nessus/279872</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279872 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - soundwire: fix enumeration completion The soundwire subsystem uses two completion structures that allow     drivers to wait for soundwire device to become enumerated on the bus and initialised by their drivers,     respectively. The code implementing the signalling is currently broken as it does not signal all current     and future waiters and also uses the wrong reinitialisation function, which can potentially lead to memory     corruption if there are still waiters on the queue. Not signalling future waiters specifically breaks     sound card probe deferrals as codec drivers can not tell that the soundwire device is already attached     when being reprobed. Some codec runtime PM implementations suffer from similar problems as waiting for     enumeration during resume can also timeout despite the device already having been enumerated.<br /></span><span>    (CVE-2023-54096)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279872">https://www.tenable.com/plugins/nessus/279872</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54043]]></title>
            <link>https://www.tenable.com/plugins/nessus/279869</link>
            <guid>https://www.tenable.com/plugins/nessus/279869</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279869 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - iommufd: Do not add the same hwpt to the ioas->hwpt_list twice The hwpt is added to the hwpt_list only     during its creation, it is never added again. This hunk is some missed leftover from rework. Adding it     twice will corrupt the linked list in some cases. It effects HWPT specific attachment, which is something     the test suite cannot cover until we can create a legitimate struct device with a non-system iommu     driver (ie we need the bus removed from the iommu code) (CVE-2023-54043)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279869">https://www.tenable.com/plugins/nessus/279869</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54076]]></title>
            <link>https://www.tenable.com/plugins/nessus/279864</link>
            <guid>https://www.tenable.com/plugins/nessus/279864</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279864 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - smb: client: fix missed ses refcounting Use new cifs_smb_ses_inc_refcount() helper to get an active     reference of @ses and @ses->dfs_root_ses (if set). This will prevent @ses->dfs_root_ses of being put in     the next call to cifs_put_smb_ses() and thus potentially causing an use-after-free bug. (CVE-2023-54076)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279864">https://www.tenable.com/plugins/nessus/279864</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2022-50769]]></title>
            <link>https://www.tenable.com/plugins/nessus/279863</link>
            <guid>https://www.tenable.com/plugins/nessus/279863</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279863 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - mmc: mxcmmc: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its     return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash     because of deleting not added device in the remove path. So fix this by checking the return value and goto     error path which will call mmc_free_host(). (CVE-2022-50769)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279863">https://www.tenable.com/plugins/nessus/279863</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54090]]></title>
            <link>https://www.tenable.com/plugins/nessus/279860</link>
            <guid>https://www.tenable.com/plugins/nessus/279860</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279860 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ixgbe: Fix panic during XDP_TX with > 64 CPUs Commit 4fe815850bdc (ixgbe: let the xdpdrv work with more     than 64 cpus) adds support to allow XDP programs to run on systems with more than 64 CPUs by locking the     XDP TX rings and indexing them using cpu % 64 (IXGBE_MAX_XDP_QS). Upon trying this out patch on a system     with more than 64 cores, the kernel paniced with an array-index-out-of-bounds at the return in     ixgbe_determine_xdp_ring in ixgbe.h, which means ixgbe_determine_xdp_q_idx was just returning the cpu     instead of cpu % IXGBE_MAX_XDP_QS. An example splat:<br /></span><span>    ========================================================================== UBSAN: array-index-out-of-     bounds in /var/lib/dkms/ixgbe/5.18.6+focal-1/build/src/ixgbe.h:1147:26 index 65 is out of range for type     'ixgbe_ring *[64]' ========================================================================== BUG: kernel     NULL pointer dereference, address: 0000000000000058 #PF: supervisor read access in kernel mode #PF:<br /></span><span>    error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] SMP NOPTI CPU: 65 PID: 408 Comm:<br /></span><span>    ksoftirqd/65 Tainted: G IOE 5.15.0-48-generic #54~20.04.1-Ubuntu Hardware name: Dell Inc. PowerEdge     R640/0W23H8, BIOS 2.5.4 01/13/2020 RIP: 0010:ixgbe_xmit_xdp_ring+0x1b/0x1c0 [ixgbe] Code: 3b 52 d4 cf e9     42 f2 ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 55 b9 00 00 00 00 48 89 e5 41 57 41 56 41 55 41 54 53 48 83     ec 08 <44> 0f b7 47 58 0f b7 47 5a 0f b7 57 54 44 0f b7 76 08 66 41 39 c0 RSP: 0018:ffffbc3fcd88fcb0     EFLAGS: 00010282 RAX: ffff92a253260980 RBX: ffffbc3fe68b00a0 RCX: 0000000000000000 RDX: ffff928b5f659000     RSI: ffff928b5f659000 RDI: 0000000000000000 RBP: ffffbc3fcd88fce0 R08: ffff92b9dfc20580 R09:<br /></span><span>    0000000000000001 R10: 3d3d3d3d3d3d3d3d R11: 3d3d3d3d3d3d3d3d R12: 0000000000000000 R13: ffff928b2f0fa8c0     R14: ffff928b9be20050 R15: 000000000000003c FS: 0000000000000000(0000) GS:ffff92b9dfc00000(0000)     knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000058 CR3:<br /></span><span>    000000011dd6a002 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000     DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: <TASK>     ixgbe_poll+0x103e/0x1280 [ixgbe] ? sched_clock_cpu+0x12/0xe0 __napi_poll+0x30/0x160     net_rx_action+0x11c/0x270 __do_softirq+0xda/0x2ee run_ksoftirqd+0x2f/0x50 smpboot_thread_fn+0xb7/0x150 ?     sort_range+0x30/0x30 kthread+0x127/0x150 ? set_kthread_struct+0x50/0x50 ret_from_fork+0x1f/0x30 </TASK> I     think this is how it happens: Upon loading the first XDP program on a system with more than 64 CPUs,     ixgbe_xdp_locking_key is incremented in ixgbe_xdp_setup. However, immediately after this, the rings are     reconfigured by ixgbe_setup_tc. ixgbe_setup_tc calls ixgbe_clear_interrupt_scheme which calls     ixgbe_free_q_vectors which calls ixgbe_free_q_vector in a loop. ixgbe_free_q_vector decrements     ixgbe_xdp_locking_key once per call if it is non-zero. Commenting out the decrement in ixgbe_free_q_vector     stopped my system from panicing. I suspect to make the original patch work, I would need to load an XDP     program and then replace it in order to get ixgbe_xdp_locking_key back above 0 since ixgbe_setup_tc is     only called when transitioning between XDP and non-XDP ring configurations, while ixgbe_xdp_locking_key is     incremented every time ixgbe_xdp_setup is called. Also, ixgbe_setup_tc can be called via ethtool --set-     channels, so this becomes another path to decrement ixgbe_xdp_locking_key to 0 on systems with more than     64 CPUs. Since ixgbe_xdp_locking_key only protects the XDP_TX path and is tied to the number of CPUs     present, there is no reason to disable it upon unloading an XDP program. To avoid confusion, I have moved     enabling ixgbe_xdp_locking_key into ixgbe_sw_init, which is part of the probe path. (CVE-2023-54090)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279860">https://www.tenable.com/plugins/nessus/279860</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2022-50782]]></title>
            <link>https://www.tenable.com/plugins/nessus/279859</link>
            <guid>https://www.tenable.com/plugins/nessus/279859</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279859 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ext4: fix bug_on in __es_tree_search caused by bad quota inode We got a issue as fllows:<br /></span><span>    ================================================================== kernel BUG at     fs/ext4/extents_status.c:202! invalid opcode: 0000 [#1] PREEMPT SMP CPU: 1 PID: 810 Comm: mount Not     tainted 6.1.0-rc1-next-g9631525255e3 #352 RIP: 0010:__es_tree_search.isra.0+0xb8/0xe0 RSP:<br /></span><span>    0018:ffffc90001227900 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 0000000077512a0f RCX: 0000000000000000     RDX: 0000000000000002 RSI: 0000000000002a10 RDI: ffff8881004cd0c8 RBP: ffff888177512ac8 R08:<br /></span><span>    47ffffffffffffff R09: 0000000000000001 R10: 0000000000000001 R11: 00000000000679af R12: 0000000000002a10     R13: ffff888177512d88 R14: 0000000077512a10 R15: 0000000000000000 FS:<br /></span><span>    00007f4bd76dbc40(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0:<br /></span><span>    0000000080050033 CR2: 00005653bf993cf8 CR3: 000000017bfdf000 CR4: 00000000000006e0 DR0: 0000000000000000     DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:<br /></span><span>    0000000000000400 Call Trace: <TASK> ext4_es_cache_extent+0xe2/0x210 ext4_cache_extents+0xd2/0x110     ext4_find_extent+0x5d5/0x8c0 ext4_ext_map_blocks+0x9c/0x1d30 ext4_map_blocks+0x431/0xa50     ext4_getblk+0x82/0x340 ext4_bread+0x14/0x110 ext4_quota_read+0xf0/0x180 v2_read_header+0x24/0x90     v2_check_quota_file+0x2f/0xa0 dquot_load_quota_sb+0x26c/0x760 dquot_load_quota_inode+0xa5/0x190     ext4_enable_quotas+0x14c/0x300 __ext4_fill_super+0x31cc/0x32c0 ext4_fill_super+0x115/0x2d0     get_tree_bdev+0x1d2/0x360 ext4_get_tree+0x19/0x30 vfs_get_tree+0x26/0xe0 path_mount+0x81d/0xfc0     do_mount+0x8d/0xc0 __x64_sys_mount+0xc0/0x160 do_syscall_64+0x35/0x80     entry_SYSCALL_64_after_hwframe+0x63/0xcd </TASK>     ================================================================== Above issue may happen as follows:<br /></span><span>    ------------------------------------- ext4_fill_super ext4_orphan_cleanup ext4_enable_quotas     ext4_quota_enable ext4_iget --> get error inode <5> ext4_ext_check_inode --> Wrong imode makes it escape     inspection make_bad_inode(inode) --> EXT4_BOOT_LOADER_INO set imode dquot_load_quota_inode     vfs_setup_quota_inode --> check pass dquot_load_quota_sb v2_check_quota_file v2_read_header     ext4_quota_read ext4_bread ext4_getblk ext4_map_blocks ext4_ext_map_blocks ext4_find_extent     ext4_cache_extents ext4_es_cache_extent __es_tree_search.isra.0 ext4_es_end --> Wrong extents trigger     BUG_ON In the above issue, s_usr_quota_inum is set to 5, but inode<5> contains incorrect imode and     disordered extents. Because 5 is EXT4_BOOT_LOADER_INO, the ext4_ext_check_inode check in the ext4_iget     function can be bypassed, finally, the extents that are not checked trigger the BUG_ON in the<br /></span><span>    __es_tree_search function. To solve this issue, check whether the inode is bad_inode in     vfs_setup_quota_inode(). (CVE-2022-50782)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279859">https://www.tenable.com/plugins/nessus/279859</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54135]]></title>
            <link>https://www.tenable.com/plugins/nessus/279854</link>
            <guid>https://www.tenable.com/plugins/nessus/279854</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279854 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - maple_tree: fix potential out-of-bounds access in mas_wr_end_piv() Check the write offset end bounds     before using it as the offset into the pivot array. This avoids a possible out-of-bounds access on the     pivot array if the write extends to the last slot in the node, in which case the node maximum should be     used as the end pivot. akpm: this doesn't affect any current callers, but new users of mapletree may     encounter this problem if backported into earlier kernels, so let's fix it in -stable kernels in case of     this. (CVE-2023-54135)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279854">https://www.tenable.com/plugins/nessus/279854</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54160]]></title>
            <link>https://www.tenable.com/plugins/nessus/279820</link>
            <guid>https://www.tenable.com/plugins/nessus/279820</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279820 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - firmware: arm_sdei: Fix sleep from invalid context BUG Running a preempt-rt (v6.2-rc3-rt1) based kernel on     an Ampere Altra triggers: BUG: sleeping function called from invalid context at     kernel/locking/spinlock_rt.c:46 in_atomic(): 0, irqs_disabled(): 128, non_block: 0, pid: 24, name: cpuhp/0     preempt_count: 0, expected: 0 RCU nest depth: 0, expected: 0 3 locks held by cpuhp/0/24: #0:<br /></span><span>    ffffda30217c70d0 (cpu_hotplug_lock){++++}-{0:0}, at: cpuhp_thread_fun+0x5c/0x248 #1: ffffda30217c7120     (cpuhp_state-up){+.+.}-{0:0}, at: cpuhp_thread_fun+0x5c/0x248 #2: ffffda3021c711f0     (sdei_list_lock){....}-{3:3}, at: sdei_cpuhp_up+0x3c/0x130 irq event stamp: 36 hardirqs last enabled at     (35): [<ffffda301e85b7bc>] finish_task_switch+0xb4/0x2b0 hardirqs last disabled at (36):<br /></span><span>    [<ffffda301e812fec>] cpuhp_thread_fun+0x21c/0x248 softirqs last enabled at (0): [<ffffda301e80b184>]     copy_process+0x63c/0x1ac0 softirqs last disabled at (0): [<0000000000000000>] 0x0 CPU: 0 PID: 24 Comm:<br /></span><span>    cpuhp/0 Not tainted 5.19.0-rc3-rt5-[...] Hardware name: WIWYNN Mt.Jade Server [...] Call trace:<br /></span><span>    dump_backtrace+0x114/0x120 show_stack+0x20/0x70 dump_stack_lvl+0x9c/0xd8 dump_stack+0x18/0x34<br /></span><span>    __might_resched+0x188/0x228 rt_spin_lock+0x70/0x120 sdei_cpuhp_up+0x3c/0x130     cpuhp_invoke_callback+0x250/0xf08 cpuhp_thread_fun+0x120/0x248 smpboot_thread_fn+0x280/0x320     kthread+0x130/0x140 ret_from_fork+0x10/0x20 sdei_cpuhp_up() is called in the STARTING hotplug section,     which runs with interrupts disabled. Use a CPUHP_AP_ONLINE_DYN entry instead to execute the cpuhp cb     later, with preemption enabled. SDEI originally got its own cpuhp slot to allow interacting with perf. It     got superseded by pNMI and this early slot is not relevant anymore. [1] Some SDEI calls (e.g.<br /></span><span>    SDEI_1_0_FN_SDEI_PE_MASK) take actions on the calling CPU. It is checked that preemption is disabled for     them. _ONLINE cpuhp cb are executed in the 'per CPU hotplug thread'. Preemption is enabled in those     threads, but their cpumask is limited to 1 CPU. Move 'WARN_ON_ONCE(preemptible())' statements so that SDEI     cpuhp cb don't trigger them. Also add a check for the SDEI_1_0_FN_SDEI_PRIVATE_RESET SDEI call which acts     on the calling CPU. [1]: https://lore.kernel.org/all/5813b8c5-ae3e-87fd-fccc-94c9cd08816d@arm.com/     (CVE-2023-54160)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279820">https://www.tenable.com/plugins/nessus/279820</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54146]]></title>
            <link>https://www.tenable.com/plugins/nessus/279814</link>
            <guid>https://www.tenable.com/plugins/nessus/279814</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279814 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - x86/kexec: Fix double-free of elf header buffer After b3e34a47f989 (x86/kexec: fix memory leak of elf     header buffer), freeing image->elf_headers in the error path of crash_load_segments() is not needed     because kimage_file_post_load_cleanup() will take care of that later. And not clearing it could result in     a double-free. Drop the superfluous vfree() call at the error path of crash_load_segments().<br /></span><span>    (CVE-2023-54146)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279814">https://www.tenable.com/plugins/nessus/279814</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54145]]></title>
            <link>https://www.tenable.com/plugins/nessus/279809</link>
            <guid>https://www.tenable.com/plugins/nessus/279809</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279809 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log It's trivial for user to trigger     verifier log line truncated warning, as verifier has a fixed-sized buffer of 1024 bytes (as of now), and     there are at least two pieces of user-provided information that can be output through this buffer, and     both can be arbitrarily sized by user: - BTF names; - BTF.ext source code lines strings. Verifier log     buffer should be properly sized for typical verifier state output. But it's sort-of expected that this     buffer won't be long enough in some circumstances. So let's drop the check. In any case code will work     correctly, at worst truncating a part of a single line output. (CVE-2023-54145)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279809">https://www.tenable.com/plugins/nessus/279809</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-68736]]></title>
            <link>https://www.tenable.com/plugins/nessus/279801</link>
            <guid>https://www.tenable.com/plugins/nessus/279801</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279801 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - landlock: Fix handling of disconnected directories Disconnected files or directories can appear when they     are visible and opened from a bind mount, but have been renamed or moved from the source of the bind mount     in a way that makes them inaccessible from the mount point (i.e. out of scope). Previously, access rights     tied to files or directories opened through a disconnected directory were collected by walking the related     hierarchy down to the root of the filesystem, without taking into account the mount point because it     couldn't be found. This could lead to inconsistent access results, potential access right widening, and     hard-to-debug renames, especially since such paths cannot be printed. For a sandboxed task to create a     disconnected directory, it needs to have write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to     the underlying source of the bind mount, and read access to the related mount point. Because a sandboxed     task cannot acquire more access rights than those defined by its Landlock domain, this could lead to     inconsistent access rights due to missing permissions that should be inherited from the mount point     hierarchy, while inheriting permissions from the filesystem hierarchy hidden by this mount point instead.<br /></span><span>    Landlock now handles files and directories opened from disconnected directories by taking into account the     filesystem hierarchy when the mount point is not found in the hierarchy walk, and also always taking into     account the mount point from which these disconnected directories were opened. This ensures that a rename     is not allowed if it would widen access rights [1]. The rationale is that, even if disconnected     hierarchies might not be visible or accessible to a sandboxed task, relying on the collected access rights     from them improves the guarantee that access rights will not be widened during a rename because of the     access right comparison between the source and the destination (see LANDLOCK_ACCESS_FS_REFER). It may look     like this would grant more access on disconnected files and directories, but the security policies are     always enforced for all the evaluated hierarchies. This new behavior should be less surprising to users     and safer from an access control perspective. Remove a wrong WARN_ON_ONCE() canary in     collect_domain_accesses() and fix the related comment. Because opened files have their access rights     stored in the related file security properties, there is no impact for disconnected or unlinked files.<br /></span><span>    (CVE-2025-68736)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279801">https://www.tenable.com/plugins/nessus/279801</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54153]]></title>
            <link>https://www.tenable.com/plugins/nessus/279770</link>
            <guid>https://www.tenable.com/plugins/nessus/279770</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279770 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ext4: turn quotas off if mount failed after enabling quotas Yi found during a review of the patch ext4:<br /></span><span>    don't BUG on inconsistent journal feature that when ext4_mark_recovery_complete() returns an error value,     the error handling path does not turn off the enabled quotas, which triggers the following kmemleak:<br /></span><span>    ================================================================ unreferenced object 0xffff8cf68678e7c0     (size 64): comm mount, pid 746, jiffies 4294871231 (age 11.540s) hex dump (first 32 bytes): 00 90 ef 82     f6 8c ff ff 00 00 00 00 41 01 00 00 ............A... c7 00 00 00 bd 00 00 00 0a 00 00 00 48 00 00 00     ............H... backtrace: [<00000000c561ef24>] __kmem_cache_alloc_node+0x4d4/0x880 [<00000000d4e621d7>]     kmalloc_trace+0x39/0x140 [<00000000837eee74>] v2_read_file_info+0x18a/0x3a0 [<0000000088f6c877>]     dquot_load_quota_sb+0x2ed/0x770 [<00000000340a4782>] dquot_load_quota_inode+0xc6/0x1c0     [<0000000089a18bd5>] ext4_enable_quotas+0x17e/0x3a0 [ext4] [<000000003a0268fa>]<br /></span><span>    __ext4_fill_super+0x3448/0x3910 [ext4] [<00000000b0f2a8a8>] ext4_fill_super+0x13d/0x340 [ext4]     [<000000004a9489c4>] get_tree_bdev+0x1dc/0x370 [<000000006e723bf1>] ext4_get_tree+0x1d/0x30 [ext4]     [<00000000c7cb663d>] vfs_get_tree+0x31/0x160 [<00000000320e1bed>] do_new_mount+0x1d5/0x480     [<00000000c074654c>] path_mount+0x22e/0xbe0 [<0000000003e97a8e>] do_mount+0x95/0xc0 [<000000002f3d3736>]<br /></span><span>    __x64_sys_mount+0xc4/0x160 [<0000000027d2140c>] do_syscall_64+0x3f/0x90     ================================================================ To solve this problem, we add a     failed_mount10 tag, and call ext4_quota_off_umount() in this tag to release the enabled qoutas.<br /></span><span>    (CVE-2023-54153)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279770">https://www.tenable.com/plugins/nessus/279770</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54083]]></title>
            <link>https://www.tenable.com/plugins/nessus/279766</link>
            <guid>https://www.tenable.com/plugins/nessus/279766</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279766 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - phy: tegra: xusb: Clear the driver reference in usb-phy dev For the dual-role port, it will assign the phy     dev to usb-phy dev and use the port dev driver as the dev driver of usb-phy. When we try to destroy the     port dev, it will destroy its dev driver as well. But we did not remove the reference from usb-phy dev.<br /></span><span>    This might cause the use-after-free issue in KASAN. (CVE-2023-54083)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279766">https://www.tenable.com/plugins/nessus/279766</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2022-50750]]></title>
            <link>https://www.tenable.com/plugins/nessus/279762</link>
            <guid>https://www.tenable.com/plugins/nessus/279762</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279762 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure In case mipi_dsi_attach() fails, call     drm_panel_remove() to avoid memory leak. (CVE-2022-50750)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279762">https://www.tenable.com/plugins/nessus/279762</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54088]]></title>
            <link>https://www.tenable.com/plugins/nessus/279744</link>
            <guid>https://www.tenable.com/plugins/nessus/279744</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279744 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - blk-cgroup: hold queue_lock when removing blkg->q_node When blkg is removed from q->blkg_list from     blkg_free_workfn(), queue_lock has to be held, otherwise, all kinds of bugs(list corruption, hard lockup,     ..) can be triggered from blkg_destroy_all(). (CVE-2023-54088)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279744">https://www.tenable.com/plugins/nessus/279744</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2023-54144]]></title>
            <link>https://www.tenable.com/plugins/nessus/279722</link>
            <guid>https://www.tenable.com/plugins/nessus/279722</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279722 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - drm/amdkfd: Fix kernel warning during topology setup This patch fixes the following kernel warning seen     during driver load by correctly initializing the p2plink attr before creating the sysfs file: [ +0.002865]<br /></span><span>    ------------[ cut here ]------------ [ +0.002327] kobject: '(null)' (0000000056260cfb): is not     initialized, yet kobject_put() is being called. [ +0.004780] WARNING: CPU: 32 PID: 1006 at     lib/kobject.c:718 kobject_put+0xaa/0x1c0 [ +0.001361] Call Trace: [ +0.001234] <TASK> [ +0.001067]     kfd_remove_sysfs_node_entry+0x24a/0x2d0 [amdgpu] [ +0.003147] kfd_topology_update_sysfs+0x3d/0x750     [amdgpu] [ +0.002890] kfd_topology_add_device+0xbd7/0xc70 [amdgpu] [ +0.002844] ? lock_release+0x13c/0x2e0     [ +0.001936] ? smu_cmn_send_smc_msg_with_param+0x1e8/0x2d0 [amdgpu] [ +0.003313] ?     amdgpu_dpm_get_mclk+0x54/0x60 [amdgpu] [ +0.002703] kgd2kfd_device_init.cold+0x39f/0x4ed [amdgpu] [     +0.002930] amdgpu_amdkfd_device_init+0x13d/0x1f0 [amdgpu] [ +0.002944]     amdgpu_device_init.cold+0x1464/0x17b4 [amdgpu] [ +0.002970] ? pci_bus_read_config_word+0x43/0x80 [     +0.002380] amdgpu_driver_load_kms+0x15/0x100 [amdgpu] [ +0.002744] amdgpu_pci_probe+0x147/0x370 [amdgpu] [     +0.002522] local_pci_probe+0x40/0x80 [ +0.001896] work_for_cpu_fn+0x10/0x20 [ +0.001892]     process_one_work+0x26e/0x5a0 [ +0.002029] worker_thread+0x1fd/0x3e0 [ +0.001890] ?     process_one_work+0x5a0/0x5a0 [ +0.002115] kthread+0xea/0x110 [ +0.001618] ?     kthread_complete_and_exit+0x20/0x20 [ +0.002422] ret_from_fork+0x1f/0x30 [ +0.001808] </TASK> [ +0.001103]     irq event stamp: 59837 [ +0.001718] hardirqs last enabled at (59849): [<ffffffffb30fab12>]<br /></span><span>    __up_console_sem+0x52/0x60 [ +0.004414] hardirqs last disabled at (59860): [<ffffffffb30faaf7>]<br /></span><span>    __up_console_sem+0x37/0x60 [ +0.004414] softirqs last enabled at (59654): [<ffffffffb307d9c7>]     irq_exit_rcu+0xd7/0x130 [ +0.004205] softirqs last disabled at (59649): [<ffffffffb307d9c7>]     irq_exit_rcu+0xd7/0x130 [ +0.004203] ---[ end trace 0000000000000000 ]--- (CVE-2023-54144)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279722">https://www.tenable.com/plugins/nessus/279722</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2022-50778]]></title>
            <link>https://www.tenable.com/plugins/nessus/279718</link>
            <guid>https://www.tenable.com/plugins/nessus/279718</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279718 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL With CONFIG_FORTIFY=y and     CONFIG_UBSAN_LOCAL_BOUNDS=y enabled, we observe a runtime panic while running Android's Compatibility Test     Suite's (CTS) android.hardware.input.cts.tests. This is stemming from a strlen() call in     hidinput_allocate(). __compiletime_strlen() is implemented in terms of __builtin_object_size(), then does     an array access to check for NUL-termination. A quirk of __builtin_object_size() is that for strings whose     values are runtime dependent, __builtin_object_size(str, 1 or 0) returns the maximum size of possible     values when those sizes are determinable at compile time. Example: static const char *v = FOO BAR;<br /></span><span>    static const char *y = FOO BA; unsigned long x (int z) { // Returns 8, which is: //     max(__builtin_object_size(v, 1), __builtin_object_size(y, 1)) return __builtin_object_size(z ? v : y, 1);<br /></span><span>    } So when FORTIFY_SOURCE is enabled, the current implementation of __compiletime_strlen() will try to     access beyond the end of y at runtime using the size of v. Mixed with UBSAN_LOCAL_BOUNDS we get a fault.<br /></span><span>    hidinput_allocate() has a local C string whose value is control flow dependent on a switch statement, so<br /></span><span>    __builtin_object_size(str, 1) evaluates to the maximum string length, making all other cases fault on the     last character check. hidinput_allocate() could be cleaned up to avoid runtime calls to strlen() since the     local variable can only have literal values, so there's no benefit to trying to fortify the strlen call     site there. Perform a __builtin_constant_p() check against index 0 earlier in the macro to filter out the     control-flow-dependant case. Add a KUnit test for checking the expected behavioral characteristics of     FORTIFY_SOURCE internals. (CVE-2022-50778)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279718">https://www.tenable.com/plugins/nessus/279718</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OT Discovery : Discovered Directly Connected Device]]></title>
            <link>https://www.tenable.com/plugins/nessus/279109</link>
            <guid>https://www.tenable.com/plugins/nessus/279109</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279109 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Use Tenable OT Discovery to discover OT devices.<br /></span>
      <h3>Description</h3>
      <span>The OT Discovery engine has identified that the remote host is an OT asset.<br /></span><span>This asset was identified via active queries and protocol-level inspection.<br /></span><span><br /></span><span>Details about any indirectly connected assets can be found in plugin 279108 - OT Discovery : Discovered Indirectly Connected Devices<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279109">https://www.tenable.com/plugins/nessus/279109</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OT Discovery : Discovered Indirectly Connected Devices]]></title>
            <link>https://www.tenable.com/plugins/nessus/279108</link>
            <guid>https://www.tenable.com/plugins/nessus/279108</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279108 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Use Tenable OT Discovery to discover OT devices.<br /></span>
      <h3>Description</h3>
      <span>Tenable OT Discovery has discovered one or more OT devices indirectly connected to the scanned host. These assets were identified via active queries and protocol-level inspection. They are not independently scanned or licensed at this stage but are presented here for visibility and planning purposes.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279108">https://www.tenable.com/plugins/nessus/279108</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-61662]]></title>
            <link>https://www.tenable.com/plugins/nessus/275735</link>
            <guid>https://www.tenable.com/plugins/nessus/275735</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 275735 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a     programming error where the gettext command remains registered in memory after its module is unloaded. An     attacker can exploit this condition by invoking the orphaned command, causing the application to access a     memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to     crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not     discarded. (CVE-2025-61662)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/275735">https://www.tenable.com/plugins/nessus/275735</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Endpoint Configuration Manager (CVE-2025-59501)]]></title>
            <link>https://www.tenable.com/plugins/nessus/271811</link>
            <guid>https://www.tenable.com/plugins/nessus/271811</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 271811 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>A system management application installed on the remote host is affected by an elevation of privilege vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The Microsoft Endpoint Configuration Manager application installed on the remote host is missing a security hotfix documented in the vendor advisory. It is, therefore, affected by an elevation of privilege vulnerability. An attacker could exploit this vulnerability by modifying the user principal name (UPN) of a valid Microsoft Entra ID account or create a new Account to impersonate an Active Directory user with the same UPN that was not synchronized to Entra ID. Successful exploitation could allow the attacker to gain unauthorized administrative control over Microsoft Configuration Manager and its managed clients.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Apply the security patch according to the vendor.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/271811">https://www.tenable.com/plugins/nessus/271811</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2022-50285]]></title>
            <link>https://www.tenable.com/plugins/nessus/264968</link>
            <guid>https://www.tenable.com/plugins/nessus/264968</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 264968 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - mm,hugetlb: take hugetlb_lock before decrementing h->resv_huge_pages The h->*_huge_pages counters are     protected by the hugetlb_lock, but alloc_huge_page has a corner case where it can decrement the counter     outside of the lock. This could lead to a corrupted value of h->resv_huge_pages, which we have observed on     our systems. Take the hugetlb_lock before decrementing h->resv_huge_pages to avoid a potential race.<br /></span><span>    (CVE-2022-50285)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/264968">https://www.tenable.com/plugins/nessus/264968</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-21587]]></title>
            <link>https://www.tenable.com/plugins/nessus/252115</link>
            <guid>https://www.tenable.com/plugins/nessus/252115</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 252115 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of     Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE:8u441,     8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK:17.0.14, 21.0.6, 24; Oracle GraalVM     Enterprise Edition:20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker     with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle     GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation,     deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle     GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete     access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data.<br /></span><span>    Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web     service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in     clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run     untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.<br /></span><span>    (CVE-2025-21587)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/252115">https://www.tenable.com/plugins/nessus/252115</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-30698]]></title>
            <link>https://www.tenable.com/plugins/nessus/252109</link>
            <guid>https://www.tenable.com/plugins/nessus/252109</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 252109 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of     Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u441,     8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM     Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated     attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK,     Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized     update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM     Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE,     Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to     cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM     Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running     sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g.,     code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not     apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed     by an administrator). (CVE-2025-30698)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/252109">https://www.tenable.com/plugins/nessus/252109</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-30691]]></title>
            <link>https://www.tenable.com/plugins/nessus/252047</link>
            <guid>https://www.tenable.com/plugins/nessus/252047</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 252047 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle     Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and 24. Difficult to exploit vulnerability allows     unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE.<br /></span><span>    Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to     some of Oracle Java SE accessible data as well as unauthorized read access to a subset of Oracle Java SE     accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g.,     through a web service which supplies data to the APIs. This vulnerability also applies to Java     deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets,     that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox     for security. (CVE-2025-30691)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/252047">https://www.tenable.com/plugins/nessus/252047</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-30749]]></title>
            <link>https://www.tenable.com/plugins/nessus/249844</link>
            <guid>https://www.tenable.com/plugins/nessus/249844</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 249844 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of     Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451,     8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle     GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker     with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle     GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java     SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java     deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets,     that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox     for security. This vulnerability does not apply to Java deployments, typically in servers, that load and     run only trusted code (e.g., code installed by an administrator). (CVE-2025-30749)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/249844">https://www.tenable.com/plugins/nessus/249844</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-50059]]></title>
            <link>https://www.tenable.com/plugins/nessus/248279</link>
            <guid>https://www.tenable.com/plugins/nessus/248279</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 248279 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of     Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE:<br /></span><span>    8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle     GraalVM Enterprise Edition: 21.3.14. Easily exploitable vulnerability allows unauthenticated attacker with     network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM     Enterprise Edition. While the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM     Enterprise Edition, attacks may significantly impact additional products (scope change). Successful     attacks of this vulnerability can result in unauthorized access to critical data or complete access to all     Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This     vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start     applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the     internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java     deployments, typically in servers, that load and run only trusted code (e.g., code installed by an     administrator). (CVE-2025-50059)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/248279">https://www.tenable.com/plugins/nessus/248279</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-50106]]></title>
            <link>https://www.tenable.com/plugins/nessus/248057</link>
            <guid>https://www.tenable.com/plugins/nessus/248057</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 248057 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of     Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451,     8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle     GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker     with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle     GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java     SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited     by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.<br /></span><span>    This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start     applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the     internet) and rely on the Java sandbox for security. (CVE-2025-50106)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/248057">https://www.tenable.com/plugins/nessus/248057</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-30752]]></title>
            <link>https://www.tenable.com/plugins/nessus/244904</link>
            <guid>https://www.tenable.com/plugins/nessus/244904</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 244904 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK product of Oracle Java SE (component:<br /></span><span>    Compiler). The supported version that is affected is Oracle Java SE: 24.0.1; Oracle GraalVM for JDK:<br /></span><span>    24.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via     multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK. Successful attacks of this     vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of     Oracle Java SE, Oracle GraalVM for JDK. Note: This vulnerability applies to Java deployments, typically in     clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run     untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This     vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted     code (e.g., code installed by an administrator). (CVE-2025-30752)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/244904">https://www.tenable.com/plugins/nessus/244904</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-30754]]></title>
            <link>https://www.tenable.com/plugins/nessus/243773</link>
            <guid>https://www.tenable.com/plugins/nessus/243773</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 243773 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of     Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u451,     8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle     GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker     with network access via TLS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM     Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or     delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition     accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK,     Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments,     typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load     and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for     security. This vulnerability does not apply to Java deployments, typically in servers, that load and run     only trusted code (e.g., code installed by an administrator). (CVE-2025-30754)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/243773">https://www.tenable.com/plugins/nessus/243773</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ubuntu 20.04 LTS / 22.04 LTS : Linux kernel vulnerabilities (USN-7683-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/243278</link>
            <guid>https://www.tenable.com/plugins/nessus/243278</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 243278 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Ubuntu host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Ubuntu 20.04 LTS / 22.04 LTS host has a package installed that is affected by multiple vulnerabilities as referenced in the USN-7683-1 advisory.<br /></span><span><br /></span><span>    Several security issues were discovered in the Linux kernel. An attacker could possibly use these to     compromise the system. This update corrects flaws in the following subsystems:<br /></span><span><br /></span><span>    - TTY drivers;<br /></span><span><br /></span><span>    - Network traffic control; (CVE-2025-38083, CVE-2024-50073)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Ubuntu security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected kernel package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/243278">https://www.tenable.com/plugins/nessus/243278</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[VMware ESXi 7.x < 7.0 Update 3w / 8.x < 8.0 Update 2e / 8.0 Update 3 < 8.0 Update 3f (VMSA-2025-0013)]]></title>
            <link>https://www.tenable.com/plugins/nessus/242168</link>
            <guid>https://www.tenable.com/plugins/nessus/242168</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 242168 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>VMware ESXi is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of VMware ESXi installed on the remote host is 7.x prior to 7.0 Update 3w, 8.x prior to 8.0 Update 2e, or 8.0 Update 3 prior to 8.0 Update 3f. It is, therefore, affected by multiple vulnerabilities as referenced in the VMSA-2025-0013 advisory:<br /></span><span><br /></span><span>  - VMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability in the VMXNET3 virtual network     adapter. (CVE-2025-41236)<br /></span><span><br /></span><span>  - VMware ESXi, Workstation, and Fusion contain an integer-underflow in VMCI (Virtual Machine Communication Interface)     that leads to an out-of-bounds write. (CVE-2025-41237)<br /></span><span><br /></span><span>  - VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI)     controller that leads to an out of-bounds write. (CVE-2025-41238)<br /></span><span><br /></span><span>  - VMware ESXi, Workstation, Fusion, and VMware Tools contains an information disclosure vulnerability due to the usage     of an uninitialised memory in vSockets. (CVE-2025-41239)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to VMware ESXi 7.0 Update 3w, 8.0 Update 2e, or 8.0 Update 3f or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/242168">https://www.tenable.com/plugins/nessus/242168</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Wing FTP Server < 7.4.4 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/241999</link>
            <guid>https://www.tenable.com/plugins/nessus/241999</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 241999 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FTP service is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The remote FTP server is running a version of Wing FTP Server earlier than 7.4.4. It is, therefore, affected by multiple vulnerabilities, as follows:<br /></span><span><br /></span><span>  - In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0' bytes, ultimately     allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary     system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote     code execution vulnerability that guarantees a total server compromise. This is also exploitable via     anonymous FTP accounts. (CVE-2025-47812)<br /></span><span><br /></span><span>  - loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application     when using a long value in the UID cookie. (CVE-2025-47813)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to version 7.4.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/241999">https://www.tenable.com/plugins/nessus/241999</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[VMware ESXi 7.0 / 8.0 Multiple Vulnerabilities (VMSA-2025-0004)]]></title>
            <link>https://www.tenable.com/plugins/nessus/237304</link>
            <guid>https://www.tenable.com/plugins/nessus/237304</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 237304 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote VMware ESXi host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of VMware ESXi installed on the remote host is 7.0 prior to 7.0 Update 3s, 8.0 Update 2 prior to 8.0 Update 2d, or 8.0 Update 3 prior to 8.0 Update 3d. It is, therefore, affected by multiple vulnerabilities as referenced in the VMSA-2025-0004 advisory:<br /></span><span><br /></span><span>  - VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an     out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this     issue to execute code as the virtual machine's VMX process running on the host. (CVE-2025-22224)<br /></span><span><br /></span><span>  - VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may     trigger an arbitrary kernel write leading to an escape of the sandbox. (CVE-2025-22225)<br /></span><span><br /></span><span>  - VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read     in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to     leak memory from the vmx process. (CVE-2025-22226)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to VMware ESXi 7.0 Update 3s, 8.0 Update 2d, or 8.0 Update 3d or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/237304">https://www.tenable.com/plugins/nessus/237304</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[VMware ESXi 7.0 / 8.0 Multiple Vulenerabilities (VMSA-2025-0010)]]></title>
            <link>https://www.tenable.com/plugins/nessus/237246</link>
            <guid>https://www.tenable.com/plugins/nessus/237246</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 237246 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The VMware ESXi is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of VMware ESXi installed on the remote host is 7.0.x prior to 7.0 Update 3v or 8.0.x prior to 8.0 Update 3e. It is, therefore, affected by multiple vulnerabilities as referenced in the VMSA-2025-0010 advisory.<br /></span><span><br /></span><span>  - ESXi contains a denial-of-service vulnerability that occurs when performing a guest operation.     (CVE-2025-41226)<br /></span><span><br /></span><span>  - Workstation, Fusion and ESXi contain a denial-of-service vulnerability due to certain guest options.     (CVE-2025-41227)<br /></span><span><br /></span><span>  - VMware ESXi and vCenter Server contain a reflected cross-site scripting vulnerability due to improper     input validation. (CVE-2025-41228)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to ESXi 7.0 Update 3v, 8.0 Update 3e or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/237246">https://www.tenable.com/plugins/nessus/237246</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-5908 : fonts-opensymbol - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/234915</link>
            <guid>https://www.tenable.com/plugins/nessus/234915</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 234915 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing a security-related update.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 12 host has packages installed that are affected by a vulnerability as referenced in the dsa-5908 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-5908-1                   security@debian.org     https://www.debian.org/security/                       Moritz Muehlenhoff     April 28, 2025                        https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : libreoffice     CVE ID         : CVE-2025-2866<br /></span><span><br /></span><span>    Juray Sarinay discovered that PDF documents signed with the     adbe.pkcs7.sha1 standard were incompletely validated by LibreOffice,     which could cause invalid signatures to be accepted as legitimate.<br /></span><span><br /></span><span>    For the stable distribution (bookworm), this problem has been fixed in     version 4:7.4.7-1+deb12u8.<br /></span><span><br /></span><span>    We recommend that you upgrade your libreoffice packages.<br /></span><span><br /></span><span>    For the detailed security status of libreoffice please refer to     its security tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/libreoffice<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the fonts-opensymbol packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/234915">https://www.tenable.com/plugins/nessus/234915</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[AnyViewer Installed (MacOSX)]]></title>
            <link>https://www.tenable.com/plugins/nessus/232316</link>
            <guid>https://www.tenable.com/plugins/nessus/232316</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 232316 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>AnyViewer is installed on the remote MacOSX host.<br /></span>
      <h3>Description</h3>
      <span>AnyViewer, remote access software, is installed on the remote MacOSX host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/232316">https://www.tenable.com/plugins/nessus/232316</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-5873 : fonts-opensymbol - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/229743</link>
            <guid>https://www.tenable.com/plugins/nessus/229743</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 229743 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing a security-related update.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 12 host has packages installed that are affected by a vulnerability as referenced in the dsa-5873 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-5873-1                   security@debian.org     https://www.debian.org/security/                     Salvatore Bonaccorso     March 04, 2025                        https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : libreoffice     CVE ID         : CVE-2025-1080<br /></span><span><br /></span><span>    Amel Bouziane-Leblond discovered that insufficient validation of     vnd.libreoffice.command URI schemes could result in the execution of     arbitrary macro commands.<br /></span><span><br /></span><span>    For the stable distribution (bookworm), this problem has been fixed in     version 4:7.4.7-1+deb12u7.<br /></span><span><br /></span><span>    We recommend that you upgrade your libreoffice packages.<br /></span><span><br /></span><span>    For the detailed security status of libreoffice please refer to its     security tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/libreoffice<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the fonts-opensymbol packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/229743">https://www.tenable.com/plugins/nessus/229743</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-5846 : fonts-opensymbol - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/214390</link>
            <guid>https://www.tenable.com/plugins/nessus/214390</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 214390 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-5846 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-5846-1                   security@debian.org     https://www.debian.org/security/                       Moritz Muehlenhoff     January 19, 2025                      https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : libreoffice     CVE ID         : CVE-2024-12425 CVE-2024-12426<br /></span><span><br /></span><span>    Thomas Rinsma discovered two security vulnerabilities in LibreOffice,     which could result in information disclosure or overwriting of files when     opening malformed documents.<br /></span><span><br /></span><span>    For the stable distribution (bookworm), these problems have been fixed in     version 4:7.4.7-1+deb12u6.<br /></span><span><br /></span><span>    We recommend that you upgrade your libreoffice packages.<br /></span><span><br /></span><span>    For the detailed security status of libreoffice please refer to     its security tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/libreoffice<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the fonts-opensymbol packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/214390">https://www.tenable.com/plugins/nessus/214390</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Palo Alto Cortex XDR Agent Installed (Linux)]]></title>
            <link>https://www.tenable.com/plugins/nessus/208935</link>
            <guid>https://www.tenable.com/plugins/nessus/208935</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 208935 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A VPN client is installed on the remote Linux host.<br /></span>
      <h3>Description</h3>
      <span>Palo Alto Cortex XDR Agent, a continuous security monitoring product, is installed on the remote Linux host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/208935">https://www.tenable.com/plugins/nessus/208935</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-5772 : fonts-opensymbol - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/207365</link>
            <guid>https://www.tenable.com/plugins/nessus/207365</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 207365 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing a security-related update.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 12 host has packages installed that are affected by a vulnerability as referenced in the dsa-5772 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-5772-1                   security@debian.org     https://www.debian.org/security/                       Moritz Muehlenhoff     September 17, 2024                    https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : libreoffice     CVE ID         : CVE-2024-7788<br /></span><span><br /></span><span>    Yufan You discovered that Libreoffice's handling of documents based on     ZIP archives was suspectible to spoofing attacks when the repair mode     attempts to address a malformed archive structure.<br /></span><span><br /></span><span>    For additional information please refer to     https://www.libreoffice.org/about-us/security/advisories/cve-2024-7788/<br /></span><span><br /></span><span>    For the stable distribution (bookworm), this problem has been fixed in     version 4:7.4.7-1+deb12u5.<br /></span><span><br /></span><span>    We recommend that you upgrade your libreoffice packages.<br /></span><span><br /></span><span>    For the detailed security status of libreoffice please refer to     its security tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/libreoffice<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the fonts-opensymbol packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/207365">https://www.tenable.com/plugins/nessus/207365</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-5737 : fonts-opensymbol - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/204990</link>
            <guid>https://www.tenable.com/plugins/nessus/204990</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 204990 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing a security-related update.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 11 / 12 host has packages installed that are affected by a vulnerability as referenced in the dsa-5737 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-5737-1                   security@debian.org     https://www.debian.org/security/                       Moritz Muehlenhoff     August 05, 2024                       https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : libreoffice     CVE ID         : CVE-2024-6472<br /></span><span><br /></span><span>    If LibreOffice failed to validate a signed macro, it displayed a warning     but still allowed execution of the script after printing a warning.<br /></span><span>    Going forward in high macro security mode such macros are now disabled.<br /></span><span><br /></span><span>    For additional information please refer to     https://www.libreoffice.org/about-us/security/advisories/cve-2024-6472/<br /></span><span><br /></span><span>    For the oldstable distribution (bullseye), this problem has been fixed     in version 1:7.0.4-4+deb11u10.<br /></span><span><br /></span><span>    For the stable distribution (bookworm), this problem has been fixed in     version 4:7.4.7-1+deb12u4.<br /></span><span><br /></span><span>    We recommend that you upgrade your libreoffice packages.<br /></span><span><br /></span><span>    For the detailed security status of libreoffice please refer to     its security tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/libreoffice<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the fonts-opensymbol packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/204990">https://www.tenable.com/plugins/nessus/204990</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-5690 : fonts-opensymbol - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/197090</link>
            <guid>https://www.tenable.com/plugins/nessus/197090</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 197090 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing a security-related update.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 11 / 12 host has packages installed that are affected by a vulnerability as referenced in the dsa-5690 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-5690-1                   security@debian.org     https://www.debian.org/security/                       Moritz Muehlenhoff     May 15, 2024                          https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : libreoffice     CVE ID         : CVE-2024-3044<br /></span><span><br /></span><span>    Amel Bouziane-Leblond discovered that LibreOffice's support for binding     scripts to click events on graphics could result in unchecked script     execution.<br /></span><span><br /></span><span>    For the oldstable distribution (bullseye), this problem has been fixed     in version 1:7.0.4-4+deb11u9.<br /></span><span><br /></span><span>    For the stable distribution (bookworm), this problem has been fixed in     version 4:7.4.7-1+deb12u2.<br /></span><span><br /></span><span>    We recommend that you upgrade your libreoffice packages.<br /></span><span><br /></span><span>    For the detailed security status of libreoffice please refer to     its security tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/libreoffice<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the fonts-opensymbol packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/197090">https://www.tenable.com/plugins/nessus/197090</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 / 9 : OpenShift Container Platform 4.12.22 (RHSA-2023:3613)]]></title>
            <link>https://www.tenable.com/plugins/nessus/194228</link>
            <guid>https://www.tenable.com/plugins/nessus/194228</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 194228 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for OpenShift Container Platform 4.12.22.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 / 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2023:3613 advisory.<br /></span><span><br /></span><span>    Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution     designed for on-premise or private cloud deployments.<br /></span><span><br /></span><span>    This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.22. See the     following advisory for the container images for this release:<br /></span><span><br /></span><span>    https://access.redhat.com/errata/RHSA-2023:3615<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)<br /></span><span><br /></span><span>    * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)<br /></span><span><br /></span><span>    * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)<br /></span><span><br /></span><span>    * golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags     (CVE-2022-32149)<br /></span><span><br /></span><span>    * golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)<br /></span><span><br /></span><span>    * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>    All OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images     when they are available in the appropriate release channel. To check for available updates, use the     OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at     https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL OpenShift Container Platform 4.12.22 packages based on the guidance in RHSA-2023:3613.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/194228">https://www.tenable.com/plugins/nessus/194228</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 / 9 : OpenShift Container Platform 4.12.0 (RHSA-2022:7398)]]></title>
            <link>https://www.tenable.com/plugins/nessus/194196</link>
            <guid>https://www.tenable.com/plugins/nessus/194196</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 194196 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for OpenShift Container Platform 4.12.0.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 / 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2022:7398 advisory.<br /></span><span><br /></span><span>    Red Hat OpenShift Container Platform is Red Hat's cloud computing     Kubernetes application platform solution designed for on-premise or private     cloud deployments.<br /></span><span><br /></span><span>    This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.0. See the following     advisory for the container images for this release:<br /></span><span><br /></span><span>    https://access.redhat.com/errata/RHSA-2022:7399<br /></span><span><br /></span><span>    Security Fix(es):<br /></span><span><br /></span><span>    * go-yaml: Denial of Service in go-yaml (CVE-2021-4235)<br /></span><span>    * golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)<br /></span><span>    * kubernetes: Unauthorized read of Custom Resources (CVE-2022-3162)<br /></span><span>    * kube-apiserver: Aggregated API server can cause clients to be redirected (SSRF) (CVE-2022-3172)<br /></span><span>    * golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)<br /></span><span>    * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)<br /></span><span>    * golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)<br /></span><span>    * golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)<br /></span><span>    * cri-o: incorrect handling of the supplementary groups (CVE-2022-2995)<br /></span><span>    * OpenShift: Missing HTTP Strict Transport Security (CVE-2022-3259)<br /></span><span>    * cri-o: Security regression of CVE-2022-27652 (CVE-2022-3466)<br /></span><span>    * golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short,     potentially allowing a denial of service (CVE-2022-32189)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>    All OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images     when they are available in the appropriate release channel. To check for available updates, use the     OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at     https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL OpenShift Container Platform 4.12.0 packages based on the guidance in RHSA-2022:7398.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/194196">https://www.tenable.com/plugins/nessus/194196</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[F-Secure Anti-Virus Installed (Windows)]]></title>
            <link>https://www.tenable.com/plugins/nessus/182587</link>
            <guid>https://www.tenable.com/plugins/nessus/182587</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 182587 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>F-Secure Anti-Virus is installed on the remote Windows host.<br /></span>
      <h3>Description</h3>
      <span>F-Secure Anti-Virus is installed on the remote Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/182587">https://www.tenable.com/plugins/nessus/182587</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[F-Secure Ultralight Installed (Windows)]]></title>
            <link>https://www.tenable.com/plugins/nessus/182586</link>
            <guid>https://www.tenable.com/plugins/nessus/182586</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 182586 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>F-Secure Ultralight was detected on the remote Windows host.<br /></span>
      <h3>Description</h3>
      <span>F-Secure Ultralight was detected on the remote Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/182586">https://www.tenable.com/plugins/nessus/182586</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CrowdStrike Falcon Sensor Installed (MacOSX)]]></title>
            <link>https://www.tenable.com/plugins/nessus/176414</link>
            <guid>https://www.tenable.com/plugins/nessus/176414</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 176414 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>CrowdStrike Falcon Sensor is installed on the remote MacOSX host.<br /></span>
      <h3>Description</h3>
      <span>CrowdStrike Falcon Sensor, an agent for the Falcon platform, is installed on the remote MacOSX host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/176414">https://www.tenable.com/plugins/nessus/176414</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CrowdStrike Falcon Sensor Installed (Linux)]]></title>
            <link>https://www.tenable.com/plugins/nessus/165456</link>
            <guid>https://www.tenable.com/plugins/nessus/165456</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 165456 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>CrowdStrike Falcon Sensor is installed on the remote Linux host.<br /></span>
      <h3>Description</h3>
      <span>CrowdStrike Falcon Sensor, an agent for the Falcon platform, is installed on the remote Linux host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/165456">https://www.tenable.com/plugins/nessus/165456</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FireEye Endpoint Agent Installed (Windows)]]></title>
            <link>https://www.tenable.com/plugins/nessus/144648</link>
            <guid>https://www.tenable.com/plugins/nessus/144648</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 144648 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>FireEye Endpoint Agent is installed on the remote Windows host.<br /></span>
      <h3>Description</h3>
      <span>FireEye Endpoint Agent, an agent for the Falcon platform, is installed on the remote Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/144648">https://www.tenable.com/plugins/nessus/144648</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ESET Cyber Security Installed (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/141173</link>
            <guid>https://www.tenable.com/plugins/nessus/141173</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 141173 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>An antivirus application is installed on the remote macOS host.<br /></span>
      <h3>Description</h3>
      <span>ESET Cyber Security, a commercial antivirus software package, is installed on the remote macOS host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/141173">https://www.tenable.com/plugins/nessus/141173</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Tanium Client Installed (Windows)]]></title>
            <link>https://www.tenable.com/plugins/nessus/140918</link>
            <guid>https://www.tenable.com/plugins/nessus/140918</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 140918 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Tanium Client is installed on the remote Windows host.<br /></span>
      <h3>Description</h3>
      <span>Tanium Client, an agent for the Tanium platform, is installed on the remote Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/140918">https://www.tenable.com/plugins/nessus/140918</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CrowdStrike Falcon Sensor Installed (Windows)]]></title>
            <link>https://www.tenable.com/plugins/nessus/140633</link>
            <guid>https://www.tenable.com/plugins/nessus/140633</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 140633 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>CrowdStrike Falcon Sensor is installed on the remote Windows host.<br /></span>
      <h3>Description</h3>
      <span>CrowdStrike Falcon Sensor, an agent for the Falcon platform, is installed on the remote Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/140633">https://www.tenable.com/plugins/nessus/140633</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[ClamAV Installed (Linux)]]></title>
            <link>https://www.tenable.com/plugins/nessus/139918</link>
            <guid>https://www.tenable.com/plugins/nessus/139918</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 139918 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Checks the packages and file system on the remote Linux host for a ClamAV installation.<br /></span>
      <h3>Description</h3>
      <span>ClamAV, an open source anti-virus software package from Cisco, has been detected on the remote Linux host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/139918">https://www.tenable.com/plugins/nessus/139918</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[BitDefender Endpoint Security Tools Detection (Windows)]]></title>
            <link>https://www.tenable.com/plugins/nessus/136761</link>
            <guid>https://www.tenable.com/plugins/nessus/136761</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 136761 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>An antivirus application is installed on the remote Windows host<br /></span>
      <h3>Description</h3>
      <span>BitDefender Endpoint Security Tools, a commercial antivirus software package, is installed on the remote Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/136761">https://www.tenable.com/plugins/nessus/136761</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[VMware Carbon Black Cloud Endpoint Standard Installed (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/134216</link>
            <guid>https://www.tenable.com/plugins/nessus/134216</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 134216 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>VMware Carbon Black Cloud Endpoint Standard is installed on the remote macOS host.<br /></span>
      <h3>Description</h3>
      <span>VMware Carbon Black Cloud Endpoint Standard, formerly Cb Defense and Confer, is installed on the remote macOS host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/134216">https://www.tenable.com/plugins/nessus/134216</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sophos Anti-Virus Detection and Status (Linux)]]></title>
            <link>https://www.tenable.com/plugins/nessus/133963</link>
            <guid>https://www.tenable.com/plugins/nessus/133963</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 133963 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>An antivirus application is installed on the remote host, but it is not working properly.<br /></span>
      <h3>Description</h3>
      <span>Sophos Anti-Virus for Linux, a commercial antivirus software package, is installed on the remote host. However, there is a problem with the installation; either its services are not running or its engine and/or virus definitions are out of date.<br /></span>
      <h3>Solution</h3>
      <span>Make sure that updates are working and the associated services are running.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/133963">https://www.tenable.com/plugins/nessus/133963</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sophos Anti-Virus Installed (Linux)]]></title>
            <link>https://www.tenable.com/plugins/nessus/133962</link>
            <guid>https://www.tenable.com/plugins/nessus/133962</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 133962 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Sophos Anti-Virus is installed on the remote Linux host.<br /></span>
      <h3>Description</h3>
      <span>Sophos Anti-Virus, a commercial antivirus software package for Linux, is installed on the remote host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/133962">https://www.tenable.com/plugins/nessus/133962</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[VMware Carbon Black Cloud Endpoint Standard Installed (Windows)]]></title>
            <link>https://www.tenable.com/plugins/nessus/133843</link>
            <guid>https://www.tenable.com/plugins/nessus/133843</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 133843 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>VMware Carbon Black Cloud Endpoint Standard is installed on the remote Windows host.<br /></span>
      <h3>Description</h3>
      <span>VMware Carbon Black Cloud Endpoint Standard, formerly Cb Defense and Confer, is installed on the remote Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/133843">https://www.tenable.com/plugins/nessus/133843</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Sophos Anti-Virus Installed (Windows)]]></title>
            <link>https://www.tenable.com/plugins/nessus/131725</link>
            <guid>https://www.tenable.com/plugins/nessus/131725</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 131725 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>An antivirus application is installed on the remote Windows host.<br /></span>
      <h3>Description</h3>
      <span>Sophos Anti-Virus, a commercial antivirus software package for Windows, is installed on the remote host.<br /></span>
      <h3>Solution</h3>
      <span>n/a.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/131725">https://www.tenable.com/plugins/nessus/131725</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Trellix Endpoint Security and Module Detection]]></title>
            <link>https://www.tenable.com/plugins/nessus/124366</link>
            <guid>https://www.tenable.com/plugins/nessus/124366</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 124366 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>A security application is installed on the remote Windows host.<br /></span>
      <h3>Description</h3>
      <span>Trellix Endpoint Security (formerly McAfee), a security application with multiple optional modules, is installed on the remote Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/124366">https://www.tenable.com/plugins/nessus/124366</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CylancePROTECT Detection (Mac OS X)]]></title>
            <link>https://www.tenable.com/plugins/nessus/106758</link>
            <guid>https://www.tenable.com/plugins/nessus/106758</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 106758 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Mac OS X host contains an antivirus application.<br /></span>
      <h3>Description</h3>
      <span>CylancePROTECT, an antivirus application, is installed on the remote Mac OS X host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/106758">https://www.tenable.com/plugins/nessus/106758</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CylancePROTECT Detection]]></title>
            <link>https://www.tenable.com/plugins/nessus/106757</link>
            <guid>https://www.tenable.com/plugins/nessus/106757</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 106757 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host contains an antivirus application.<br /></span>
      <h3>Description</h3>
      <span>CylancePROTECT, an antivirus application, is installed on the   Windows host.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/106757">https://www.tenable.com/plugins/nessus/106757</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3922]]></title>
            <link>https://www.tenable.com/plugins/nessus/301972</link>
            <guid>https://www.tenable.com/plugins/nessus/301972</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301972 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)     (CVE-2026-3922)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301972">https://www.tenable.com/plugins/nessus/301972</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3937]]></title>
            <link>https://www.tenable.com/plugins/nessus/301971</link>
            <guid>https://www.tenable.com/plugins/nessus/301971</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301971 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Incorrect security UI in Downloads in Google Chrome on Android prior to 146.0.7680.71 allowed a remote     attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2026-3937)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301971">https://www.tenable.com/plugins/nessus/301971</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3916]]></title>
            <link>https://www.tenable.com/plugins/nessus/301970</link>
            <guid>https://www.tenable.com/plugins/nessus/301970</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301970 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)     (CVE-2026-3916)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301970">https://www.tenable.com/plugins/nessus/301970</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3917]]></title>
            <link>https://www.tenable.com/plugins/nessus/301968</link>
            <guid>https://www.tenable.com/plugins/nessus/301968</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301968 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially     exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3917)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301968">https://www.tenable.com/plugins/nessus/301968</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3926]]></title>
            <link>https://www.tenable.com/plugins/nessus/301967</link>
            <guid>https://www.tenable.com/plugins/nessus/301967</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301967 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out     of bounds memory access via a crafted HTML page. (Chromium security severity: Medium) (CVE-2026-3926)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301967">https://www.tenable.com/plugins/nessus/301967</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3941]]></title>
            <link>https://www.tenable.com/plugins/nessus/301966</link>
            <guid>https://www.tenable.com/plugins/nessus/301966</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301966 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote     attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)     (CVE-2026-3941)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301966">https://www.tenable.com/plugins/nessus/301966</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3934]]></title>
            <link>https://www.tenable.com/plugins/nessus/301965</link>
            <guid>https://www.tenable.com/plugins/nessus/301965</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301965 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insufficient policy enforcement in ChromeDriver in Google Chrome prior to 146.0.7680.71 allowed a remote     attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3934)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301965">https://www.tenable.com/plugins/nessus/301965</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3915]]></title>
            <link>https://www.tenable.com/plugins/nessus/301964</link>
            <guid>https://www.tenable.com/plugins/nessus/301964</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301964 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform     an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3915)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301964">https://www.tenable.com/plugins/nessus/301964</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3919]]></title>
            <link>https://www.tenable.com/plugins/nessus/301963</link>
            <guid>https://www.tenable.com/plugins/nessus/301963</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301963 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a     user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.<br /></span><span>    (Chromium security severity: High) (CVE-2026-3919)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301963">https://www.tenable.com/plugins/nessus/301963</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3924]]></title>
            <link>https://www.tenable.com/plugins/nessus/301962</link>
            <guid>https://www.tenable.com/plugins/nessus/301962</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301962 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had     compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.<br /></span><span>    (Chromium security severity: High) (CVE-2026-3924)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301962">https://www.tenable.com/plugins/nessus/301962</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3940]]></title>
            <link>https://www.tenable.com/plugins/nessus/301961</link>
            <guid>https://www.tenable.com/plugins/nessus/301961</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301961 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote     attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)     (CVE-2026-3940)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301961">https://www.tenable.com/plugins/nessus/301961</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3914]]></title>
            <link>https://www.tenable.com/plugins/nessus/301959</link>
            <guid>https://www.tenable.com/plugins/nessus/301959</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301959 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially     exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3914)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301959">https://www.tenable.com/plugins/nessus/301959</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3918]]></title>
            <link>https://www.tenable.com/plugins/nessus/301958</link>
            <guid>https://www.tenable.com/plugins/nessus/301958</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301958 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially     exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3918)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301958">https://www.tenable.com/plugins/nessus/301958</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3930]]></title>
            <link>https://www.tenable.com/plugins/nessus/301957</link>
            <guid>https://www.tenable.com/plugins/nessus/301957</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301957 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Unsafe navigation in Navigation in Google Chrome on iOS prior to 146.0.7680.71 allowed a remote attacker     to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3930)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301957">https://www.tenable.com/plugins/nessus/301957</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3928]]></title>
            <link>https://www.tenable.com/plugins/nessus/301956</link>
            <guid>https://www.tenable.com/plugins/nessus/301956</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301956 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insufficient policy enforcement in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker     who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome     Extension. (Chromium security severity: Medium) (CVE-2026-3928)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301956">https://www.tenable.com/plugins/nessus/301956</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3923]]></title>
            <link>https://www.tenable.com/plugins/nessus/301955</link>
            <guid>https://www.tenable.com/plugins/nessus/301955</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301955 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially     exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3923)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301955">https://www.tenable.com/plugins/nessus/301955</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3939]]></title>
            <link>https://www.tenable.com/plugins/nessus/301954</link>
            <guid>https://www.tenable.com/plugins/nessus/301954</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301954 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insufficient policy enforcement in PDF in Google Chrome prior to 146.0.7680.71 allowed a remote attacker     to bypass navigation restrictions via a crafted PDF file. (Chromium security severity: Low)     (CVE-2026-3939)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301954">https://www.tenable.com/plugins/nessus/301954</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3932]]></title>
            <link>https://www.tenable.com/plugins/nessus/301953</link>
            <guid>https://www.tenable.com/plugins/nessus/301953</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301953 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insufficient policy enforcement in PDF in Google Chrome on Android prior to 146.0.7680.71 allowed a remote     attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3932)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301953">https://www.tenable.com/plugins/nessus/301953</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3938]]></title>
            <link>https://www.tenable.com/plugins/nessus/301952</link>
            <guid>https://www.tenable.com/plugins/nessus/301952</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301952 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Insufficient policy enforcement in Clipboard in Google Chrome prior to 146.0.7680.71 allowed a remote     attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.<br /></span><span>    (Chromium security severity: Low) (CVE-2026-3938)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301952">https://www.tenable.com/plugins/nessus/301952</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3936]]></title>
            <link>https://www.tenable.com/plugins/nessus/301951</link>
            <guid>https://www.tenable.com/plugins/nessus/301951</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301951 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3936)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301951">https://www.tenable.com/plugins/nessus/301951</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3929]]></title>
            <link>https://www.tenable.com/plugins/nessus/301950</link>
            <guid>https://www.tenable.com/plugins/nessus/301950</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301950 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a     remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3929)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301950">https://www.tenable.com/plugins/nessus/301950</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3921]]></title>
            <link>https://www.tenable.com/plugins/nessus/301949</link>
            <guid>https://www.tenable.com/plugins/nessus/301949</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301949 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)     (CVE-2026-3921)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301949">https://www.tenable.com/plugins/nessus/301949</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3927]]></title>
            <link>https://www.tenable.com/plugins/nessus/301948</link>
            <guid>https://www.tenable.com/plugins/nessus/301948</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301948 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote     attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3927)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301948">https://www.tenable.com/plugins/nessus/301948</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3913]]></title>
            <link>https://www.tenable.com/plugins/nessus/301947</link>
            <guid>https://www.tenable.com/plugins/nessus/301947</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301947 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)     (CVE-2026-3913)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301947">https://www.tenable.com/plugins/nessus/301947</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3920]]></title>
            <link>https://www.tenable.com/plugins/nessus/301946</link>
            <guid>https://www.tenable.com/plugins/nessus/301946</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301946 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)     (CVE-2026-3920)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301946">https://www.tenable.com/plugins/nessus/301946</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3942]]></title>
            <link>https://www.tenable.com/plugins/nessus/301945</link>
            <guid>https://www.tenable.com/plugins/nessus/301945</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301945 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote     attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) (CVE-2026-3942)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301945">https://www.tenable.com/plugins/nessus/301945</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3931]]></title>
            <link>https://www.tenable.com/plugins/nessus/301944</link>
            <guid>https://www.tenable.com/plugins/nessus/301944</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301944 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform     out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium) (CVE-2026-3931)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301944">https://www.tenable.com/plugins/nessus/301944</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3925]]></title>
            <link>https://www.tenable.com/plugins/nessus/301943</link>
            <guid>https://www.tenable.com/plugins/nessus/301943</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301943 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Incorrect security UI in LookalikeChecks in Google Chrome on Android prior to 146.0.7680.71 allowed a     remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3925)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301943">https://www.tenable.com/plugins/nessus/301943</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3935]]></title>
            <link>https://www.tenable.com/plugins/nessus/301942</link>
            <guid>https://www.tenable.com/plugins/nessus/301942</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301942 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Incorrect security UI in WebAppInstalls in Google Chrome prior to 146.0.7680.71 allowed a remote attacker     to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium) (CVE-2026-3935)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301942">https://www.tenable.com/plugins/nessus/301942</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-30928]]></title>
            <link>https://www.tenable.com/plugins/nessus/301856</link>
            <guid>https://www.tenable.com/plugins/nessus/301856</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301856 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.1, the /api/4/config REST     API endpoint returns the entire parsed Glances configuration file (glances.conf) via self.config.as_dict()     with no filtering of sensitive values. The configuration file contains credentials for all configured     backend services including database passwords, API tokens, JWT signing keys, and SSL key passwords. This     vulnerability is fixed in 4.5.1. (CVE-2026-30928)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301856">https://www.tenable.com/plugins/nessus/301856</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1940]]></title>
            <link>https://www.tenable.com/plugins/nessus/301748</link>
            <guid>https://www.tenable.com/plugins/nessus/301748</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301748 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The GStreamer project reports multiple security vulnerabilities fixed in the 1.28.1 release: Twelve     security vulnerabilities were addressed, including: These could lead to application crashes or potentially     arbitrary code execution. (CVE-2026-1940)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301748">https://www.tenable.com/plugins/nessus/301748</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050a / 20.1060a / 20.1070a Security Update: gnupg2 (UTSA-2026-005933)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301658</link>
            <guid>https://www.tenable.com/plugins/nessus/301658</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301658 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005933 advisory.<br /></span><span><br /></span><span>    In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is     intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are     fixed versions.)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected gnupg2 package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301658">https://www.tenable.com/plugins/nessus/301658</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050a / 20.1060a / 20.1070a Security Update: iperf3 (UTSA-2026-005934)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301657</link>
            <guid>https://www.tenable.com/plugins/nessus/301657</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301657 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005934 advisory.<br /></span><span><br /></span><span>    In iperf before 3.19.1, iperf_auth.c has an off-by-one error and resultant heap-based buffer overflow.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected iperf3 package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301657">https://www.tenable.com/plugins/nessus/301657</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: python-tornado (UTSA-2026-005918)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301497</link>
            <guid>https://www.tenable.com/plugins/nessus/301497</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301497 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005918 advisory.<br /></span><span><br /></span><span>    Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-     data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of     the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS     attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of     Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado     version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type:<br /></span><span>    multipart/form-data` in a proxy.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python-tornado package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301497">https://www.tenable.com/plugins/nessus/301497</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050a / 20.1060a / 20.1070a Security Update: transfig (UTSA-2026-005916)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301482</link>
            <guid>https://www.tenable.com/plugins/nessus/301482</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301482 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005916 advisory.<br /></span><span><br /></span><span>    A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation     via bezier_spline function.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected transfig package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301482">https://www.tenable.com/plugins/nessus/301482</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: net-snmp (UTSA-2026-005913)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301481</link>
            <guid>https://www.tenable.com/plugins/nessus/301481</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301481 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005913 advisory.<br /></span><span><br /></span><span>    net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a     specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to     crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected net-snmp package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301481">https://www.tenable.com/plugins/nessus/301481</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1060a / 20.1070a Security Update: glib2 (UTSA-2026-005914)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301480</link>
            <guid>https://www.tenable.com/plugins/nessus/301480</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301480 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005914 advisory.<br /></span><span><br /></span><span>    A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in     the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable     characters (which would need escaping), the calculation of the length of the escaped string could     overflow, leading to a potential write off the end of the newly allocated string.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected glib2 package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301480">https://www.tenable.com/plugins/nessus/301480</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050a / 20.1060a / 20.1070a Security Update: libreoffice (UTSA-2026-005915)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301479</link>
            <guid>https://www.tenable.com/plugins/nessus/301479</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301479 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005915 advisory.<br /></span><span><br /></span><span>    LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint     server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected     versions of LibreOffice a link in a browser using that scheme could be constructed with an embedded inner     URL that when passed to LibreOffice could call internal macros with arbitrary arguments.<br /></span><span>    This issue affects LibreOffice: from 24.8 before < 24.8.5, from 25.2 before < 25.2.1.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected libreoffice package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301479">https://www.tenable.com/plugins/nessus/301479</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: python-tornado (UTSA-2026-005912)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301468</link>
            <guid>https://www.tenable.com/plugins/nessus/301468</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301468 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005912 advisory.<br /></span><span><br /></span><span>    Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, a     single maliciously crafted HTTP request can block the server's event loop for an extended period, caused     by the HTTPHeaders.add method. The function accumulates values using string concatenation when the same     header name is repeated, causing a Denial of Service (DoS).  Due to Python string immutability, each     concatenation copies the entire string, resulting in O(n) time complexity. The severity can vary from     high if max_header_size has been increased from its default, to low if it has its default value of 64KB.<br /></span><span>    This issue is fixed in version 6.5.3.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python-tornado package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301468">https://www.tenable.com/plugins/nessus/301468</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unity Linux 20.1050e / 20.1060e / 20.1070e Security Update: python-tornado (UTSA-2026-005911)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301467</link>
            <guid>https://www.tenable.com/plugins/nessus/301467</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301467 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Unity Linux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The Unity Linux 20 host has a package installed that is affected by a vulnerability as referenced in the UTSA-2026-005911 advisory.<br /></span><span><br /></span><span>    Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an     inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The<br /></span><span>    _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in     multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted     semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a     Content-Disposition header, the server's CPU usage increases quadratically (O(n)) during parsing. Due to     Tornado's single event loop architecture, a single malicious request can cause the entire server to become     unresponsive for an extended period. This issue is fixed in version 6.5.3.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Unity Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python-tornado package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301467">https://www.tenable.com/plugins/nessus/301467</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3441]]></title>
            <link>https://www.tenable.com/plugins/nessus/300633</link>
            <guid>https://www.tenable.com/plugins/nessus/300633</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300633 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Debian Linux - binutils - A flaw was found in GNU Binutils. This heap-based buffer overflow vulnerability,     specifically an out-of-bounds read in the bfd linker, allows an attacker to gain access to sensitive     information. By convincing a user to process a specially crafted XCOFF object file, an attacker can     trigger this flaw, potentially leading to information disclosure or an application level denial of     service.  Red Hat Enterprise Linux - binutils: GNU Binutils: Information disclosure via specially crafted     XCOFF object file  Ubuntu Linux - [Unknown description] (CVE-2026-3441)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300633">https://www.tenable.com/plugins/nessus/300633</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3442]]></title>
            <link>https://www.tenable.com/plugins/nessus/300628</link>
            <guid>https://www.tenable.com/plugins/nessus/300628</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 300628 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Debian Linux - binutils - A flaw was found in GNU Binutils. This vulnerability, a heap-based buffer     overflow, specifically an out-of-bounds read, exists in the bfd linker component. An attacker could     exploit this by convincing a user to process a specially crafted malicious XCOFF object file. Successful     exploitation may lead to the disclosure of sensitive information or cause the application to crash,     resulting in an application level denial of service.  Red Hat Enterprise Linux - binutils: GNU Binutils:<br /></span><span>    Information disclosure or denial of service via out-of-bounds read in bfd linker  Ubuntu Linux - [Unknown     description] (CVE-2026-3442)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/300628">https://www.tenable.com/plugins/nessus/300628</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-21620]]></title>
            <link>https://www.tenable.com/plugins/nessus/299721</link>
            <guid>https://www.tenable.com/plugins/nessus/299721</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299721 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Relative Path Traversal, Improper Isolation or Compartmentalization vulnerability in erlang otp erlang/otp     (tftp_file modules), erlang otp inets (tftp_file modules), erlang otp tftp (tftp_file modules) allows     Relative Path Traversal. This vulnerability is associated with program files lib/tftp/src/tftp_file.erl,     src/tftp_file.erl. This issue affects otp: from 17.0, from 07b8f441ca711f9812fad9e9115bab3c3aa92f79; otp:<br /></span><span>    from 5.10 before 7.0; otp: from 1.0. (CVE-2026-21620)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299721">https://www.tenable.com/plugins/nessus/299721</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-15281]]></title>
            <link>https://www.tenable.com/plugins/nessus/294814</link>
            <guid>https://www.tenable.com/plugins/nessus/294814</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 294814 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to     version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on     subsequent calls to wordfree may abort the process. (CVE-2025-15281)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/294814">https://www.tenable.com/plugins/nessus/294814</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-0915]]></title>
            <link>https://www.tenable.com/plugins/nessus/288876</link>
            <guid>https://www.tenable.com/plugins/nessus/288876</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 288876 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS     backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version     2.42 can leak stack contents to the configured DNS resolver. (CVE-2026-0915)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/288876">https://www.tenable.com/plugins/nessus/288876</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-0861]]></title>
            <link>https://www.tenable.com/plugins/nessus/286817</link>
            <guid>https://www.tenable.com/plugins/nessus/286817</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 286817 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign,     aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could     consequently result in a heap corruption. Note that the attacker must have control over both, the size as     well as the alignment arguments of the memalign function to be able to exploit this. The size parameter     must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This     limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly     1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a     known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled,     because of which this may not be easily exploitable in practice. An application bug could potentially     result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow     in the application or its dependent libraries, but that is again an uncommon usage pattern given typical     sources of alignments. (CVE-2026-0861)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/286817">https://www.tenable.com/plugins/nessus/286817</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-11494]]></title>
            <link>https://www.tenable.com/plugins/nessus/270211</link>
            <guid>https://www.tenable.com/plugins/nessus/270211</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 270211 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections     of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The     attack needs to be approached locally. The exploit has been made public and could be used. The patch is     identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.<br /></span><span>    (CVE-2025-11494)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/270211">https://www.tenable.com/plugins/nessus/270211</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-47229]]></title>
            <link>https://www.tenable.com/plugins/nessus/244776</link>
            <guid>https://www.tenable.com/plugins/nessus/244776</guid>
            <pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 244776 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - libpspp-core.a in GNU PSPP through 2.0.1 allows attackers to cause a denial of service     (var_set_leave_quiet assertion failure and application exit) via crafted input data, such as data that     triggers a call from src/data/dictionary.c code into src/data/variable.c code. (CVE-2025-47229)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/244776">https://www.tenable.com/plugins/nessus/244776</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Oracle Linux 8 / 9 : dtrace (ELSA-2026-50152)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302228</link>
            <guid>https://www.tenable.com/plugins/nessus/302228</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302228 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Oracle Linux host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote Oracle Linux 8 / 9 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2026-50152 advisory.<br /></span><span><br /></span><span>    [2.0.6-1]<br /></span><span>    - Fix dtprobed unsafe probe description handling (CVE-2026-21991).<br /></span><span>      [Orabug: 39054018]<br /></span><span><br /></span><span>      Credit Statement       The following people or organizations reported security vulnerabilities addressed by this ELSA to     Oracle:<br /></span><span>        Dhiraj Mishra: CVE-2026-21991<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected dtrace, dtrace-devel and / or dtrace-testsuite packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302228">https://www.tenable.com/plugins/nessus/302228</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-21619]]></title>
            <link>https://www.tenable.com/plugins/nessus/302196</link>
            <guid>https://www.tenable.com/plugins/nessus/302196</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302196 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Uncontrolled Resource Consumption, Deserialization of Untrusted Data vulnerability in hexpm hex_core     (hex_api modules), hexpm hex (mix_hex_api modules), erlang rebar3 (r3_hex_api modules) allows Object     Injection, Excessive Allocation. This vulnerability is associated with program files src/hex_api.erl,     src/mix_hex_api.erl, apps/rebar/src/vendored/r3_hex_api.erl and program routines hex_core:request/4,     mix_hex_api:request/4, r3_hex_api:request/4. This issue affects hex_core: from 0.1.0 before 0.12.1; hex:<br /></span><span>    from 2.3.0 before 2.3.2; rebar3: from 3.9.1 before 3.27.0. (CVE-2026-21619)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302196">https://www.tenable.com/plugins/nessus/302196</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-32141]]></title>
            <link>https://www.tenable.com/plugins/nessus/302061</link>
            <guid>https://www.tenable.com/plugins/nessus/302061</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302061 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive()     phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested     or self-referential $ indices, the recursion depth is unbounded, causing a stack overflow that crashes the     Node.js process. This vulnerability is fixed in 3.4.0. (CVE-2026-32141)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302061">https://www.tenable.com/plugins/nessus/302061</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-6162 : ata-modules-6.12.74+deb13+1-armmp-di - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/302010</link>
            <guid>https://www.tenable.com/plugins/nessus/302010</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302010 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 13 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6162 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-6162-1                   security@debian.org     https://www.debian.org/security/                     Salvatore Bonaccorso     March 12, 2026                        https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : linux     CVE ID         : CVE-2025-71238 CVE-2026-23100 CVE-2026-23221 CVE-2026-23233                      CVE-2026-23234 CVE-2026-23235 CVE-2026-23236 CVE-2026-23237                      CVE-2026-23238<br /></span><span><br /></span><span>    Several vulnerabilities have been discovered in the Linux kernel that     may lead to a privilege escalation, denial of service or information     leaks.<br /></span><span><br /></span><span>    The Qualys Threat Research Unit (TRU) discovered several vulnerabilities     in Apparmor. Details can be found in the Qualys advisory at     https://www.qualys.com/2026/03/10/crack-armor.txt<br /></span><span><br /></span><span>    For the stable distribution (trixie), these problems have been fixed in     version 6.12.74-2.<br /></span><span><br /></span><span>    We recommend that you upgrade your linux packages.<br /></span><span><br /></span><span>    For the detailed security status of linux please refer to its security     tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/linux<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the ata-modules-6.12.74+deb13+1-armmp-di packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302010">https://www.tenable.com/plugins/nessus/302010</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : virt:rhel and virt-devel:rhel (RLSA-2023:5264)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301880</link>
            <guid>https://www.tenable.com/plugins/nessus/301880</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301880 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2023:5264 advisory.<br /></span><span><br /></span><span>    * QEMU: VNC: improper I/O watch removal in TLS handshake can lead to remote unauthenticated denial of     service (CVE-2023-3354)<br /></span><span><br /></span><span>    * NTFS-3G: buffer overflow issue in NTFS-3G can cause code execution via crafted metadata in an NTFS image     (CVE-2022-40284)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301880">https://www.tenable.com/plugins/nessus/301880</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : postgresql:16 (RLSA-2026:4063)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301558</link>
            <guid>https://www.tenable.com/plugins/nessus/301558</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301558 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:4063 advisory.<br /></span><span><br /></span><span>    * postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code     (CVE-2026-2006)<br /></span><span><br /></span><span>    * postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes     arbitrary code (CVE-2026-2004)<br /></span><span><br /></span><span>    * postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301558">https://www.tenable.com/plugins/nessus/301558</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23925]]></title>
            <link>https://www.tenable.com/plugins/nessus/301541</link>
            <guid>https://www.tenable.com/plugins/nessus/301541</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301541 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An authenticated Zabbix user (User role) with template/host write permissions is able to create objects     via the configuration.import API. This can lead to confidentiality loss by creating unauthorized hosts.<br /></span><span>    Note that the User role is normally not sufficient to create and edit templates/hosts even with write     permissions. (CVE-2026-23925)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301541">https://www.tenable.com/plugins/nessus/301541</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : postgresql:15 (RLSA-2026:4059)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301540</link>
            <guid>https://www.tenable.com/plugins/nessus/301540</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301540 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:4059 advisory.<br /></span><span><br /></span><span>    * postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code     (CVE-2026-2006)<br /></span><span><br /></span><span>    * postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes     arbitrary code (CVE-2026-2004)<br /></span><span><br /></span><span>    * postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301540">https://www.tenable.com/plugins/nessus/301540</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : postgresql:13 (RLSA-2026:4024)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301539</link>
            <guid>https://www.tenable.com/plugins/nessus/301539</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301539 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:4024 advisory.<br /></span><span><br /></span><span>    * postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code     (CVE-2026-2006)<br /></span><span><br /></span><span>    * postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes     arbitrary code (CVE-2026-2004)<br /></span><span><br /></span><span>    * postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301539">https://www.tenable.com/plugins/nessus/301539</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RockyLinux 8 : postgresql:12 (RLSA-2026:4064)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301538</link>
            <guid>https://www.tenable.com/plugins/nessus/301538</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301538 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote RockyLinux host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The remote RockyLinux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RLSA-2026:4064 advisory.<br /></span><span><br /></span><span>    * postgresql: PostgreSQL missing validation of multibyte character length executes arbitrary code     (CVE-2026-2006)<br /></span><span><br /></span><span>    * postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes     arbitrary code (CVE-2026-2004)<br /></span><span><br /></span><span>    * postgresql: PostgreSQL pgcrypto heap buffer overflow executes arbitrary code (CVE-2026-2005)<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the RockyLinux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301538">https://www.tenable.com/plugins/nessus/301538</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2219]]></title>
            <link>https://www.tenable.com/plugins/nessus/301114</link>
            <guid>https://www.tenable.com/plugins/nessus/301114</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301114 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not     properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may     result in denial of service (infinite loop spinning the CPU). (CVE-2026-2219)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301114">https://www.tenable.com/plugins/nessus/301114</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2048]]></title>
            <link>https://www.tenable.com/plugins/nessus/299704</link>
            <guid>https://www.tenable.com/plugins/nessus/299704</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299704 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required     to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The     specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation     of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can     leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28591.<br /></span><span>    (CVE-2026-2048)<br /></span><span><br /></span><span>  - This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP.<br /></span><span>    User interaction is required to exploit this vulnerability in that the target must visit a malicious page     or open a malicious file.  The specific flaw exists within the parsing of XWD files. The issue results     from the lack of proper validation of user-supplied data, which can result in a write past the end of an     allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the     current process. (CVE-2026-2048)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299704">https://www.tenable.com/plugins/nessus/299704</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-0797]]></title>
            <link>https://www.tenable.com/plugins/nessus/299702</link>
            <guid>https://www.tenable.com/plugins/nessus/299702</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299702 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is     required to exploit this vulnerability in that the target must visit a malicious page or open a malicious     file. The specific flaw exists within the parsing of ICO files. The issue results from the lack of proper     validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can     leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28599.<br /></span><span>    (CVE-2026-0797)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299702">https://www.tenable.com/plugins/nessus/299702</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2044]]></title>
            <link>https://www.tenable.com/plugins/nessus/299701</link>
            <guid>https://www.tenable.com/plugins/nessus/299701</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299701 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required     to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The     specific flaw exists within the parsing of PGM files. The issue results from the lack of proper     initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute     code in the context of the current process. Was ZDI-CAN-28158. (CVE-2026-2044)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299701">https://www.tenable.com/plugins/nessus/299701</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2045]]></title>
            <link>https://www.tenable.com/plugins/nessus/299700</link>
            <guid>https://www.tenable.com/plugins/nessus/299700</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 299700 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows     remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required     to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The     specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation     of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can     leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28265.<br /></span><span>    (CVE-2026-2045)<br /></span><span><br /></span><span>  - This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP.<br /></span><span>    User interaction is required to exploit this vulnerability in that the target must visit a malicious page     or open a malicious file.  The specific flaw exists within the parsing of XWD files. The issue results     from the lack of proper validation of user-supplied data, which can result in a write past the end of an     allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the     current process. (CVE-2026-2045)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/299700">https://www.tenable.com/plugins/nessus/299700</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-21968]]></title>
            <link>https://www.tenable.com/plugins/nessus/297725</link>
            <guid>https://www.tenable.com/plugins/nessus/297725</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 297725 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported     versions that are affected are 8.0.0-8.0.44, 8.4.0-8.4.7 and 9.0.0-9.5.0. Easily exploitable vulnerability     allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.<br /></span><span>    Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently     repeatable crash (complete DOS) of MySQL Server. (CVE-2026-21968)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/297725">https://www.tenable.com/plugins/nessus/297725</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-24765]]></title>
            <link>https://www.tenable.com/plugins/nessus/297036</link>
            <guid>https://www.tenable.com/plugins/nessus/297036</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 297036 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8,     11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test     execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage     files without validation, potentially allowing remote code execution if malicious `.coverage` files are     present prior to the execution of the PHPT test. The vulnerability occurs when a `.coverage` file, which     should not exist before test execution, is deserialized without the `allowed_classes` parameter     restriction. An attacker with local file write access can place a malicious serialized object with a     `__wakeup()` method into the file system, leading to arbitrary code execution during test runs with code     coverage instrumentation enabled. This vulnerability requires local file write access to the location     where PHPUnit stores or expects code coverage files for PHPT tests. This can occur through CI/CD pipeline     attacks, the local development environment, and/or compromised dependencies. Rather than just silently     sanitizing the input via `['allowed_classes' => false]`, the maintainer has chosen to make the anomalous     state explicit by treating pre-existing `.coverage` files for PHPT tests as an error condition. Starting     in versions in versions 12.5.8, 11.5.50, 10.5.62, 9.6.33, when a `.coverage` file is detected for a PHPT     test prior to execution, PHPUnit will emit a clear error message identifying the anomalous state.<br /></span><span>    Organizations can reduce the effective risk of this vulnerability through proper CI/CD configuration,     including ephemeral runners, code review enforcement, branch protection, artifact isolation, and access     control. (CVE-2026-24765)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/297036">https://www.tenable.com/plugins/nessus/297036</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-58150]]></title>
            <link>https://www.tenable.com/plugins/nessus/296777</link>
            <guid>https://www.tenable.com/plugins/nessus/296777</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 296777 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of     these variables are written to with guest controlled data, of guest controllable size. That size can be     larger than the variable, and bounding of the writes was missing. (CVE-2025-58150)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/296777">https://www.tenable.com/plugins/nessus/296777</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-24486]]></title>
            <link>https://www.tenable.com/plugins/nessus/296740</link>
            <guid>https://www.tenable.com/plugins/nessus/296740</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 296740 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal     vulnerability exists when using non-default configuration options `UPLOAD_DIR` and     `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem     by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a     workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations. (CVE-2026-24486)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/296740">https://www.tenable.com/plugins/nessus/296740</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23949]]></title>
            <link>https://www.tenable.com/plugins/nessus/293775</link>
            <guid>https://www.tenable.com/plugins/nessus/293775</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 293775 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - jaraco.context, an open-source software package that provides some useful decorators and context managers,     has a Zip Slip path traversal vulnerability in the `jaraco.context.tarball()` function starting in version     5.2.0 and prior to version 6.1.0. The vulnerability may allow attackers to extract files outside the     intended extraction directory when malicious tar archives are processed. The strip_first_component filter     splits the path on the first `/` and extracts the second component, while allowing `../` sequences. Paths     like `dummy_dir/../../etc/passwd` become `../../etc/passwd`. Note that this suffers from a nested tarball     attack as well with multi-level tar files such as `dummy_dir/inner.tar.gz`, where the inner.tar.gz     includes a traversal `dummy_dir/../../config/.env` that also gets translated to `../../config/.env`.<br /></span><span>    Version 6.1.0 contains a patch for the issue. (CVE-2026-23949)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/293775">https://www.tenable.com/plugins/nessus/293775</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-56226]]></title>
            <link>https://www.tenable.com/plugins/nessus/286805</link>
            <guid>https://www.tenable.com/plugins/nessus/286805</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 286805 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Libsndfile <=1.2.2 contains a memory leak vulnerability in the mpeg_l3_encoder_init() function within the     mpeg_l3_encode.c file. (CVE-2025-56226)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/286805">https://www.tenable.com/plugins/nessus/286805</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-0665]]></title>
            <link>https://www.tenable.com/plugins/nessus/282642</link>
            <guid>https://www.tenable.com/plugins/nessus/282642</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 282642 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to     trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface,     leading to a denial of service or potential memory corruption. (CVE-2026-0665)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/282642">https://www.tenable.com/plugins/nessus/282642</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-56225]]></title>
            <link>https://www.tenable.com/plugins/nessus/282581</link>
            <guid>https://www.tenable.com/plugins/nessus/282581</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 282581 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - fluidsynth-2.4.6 and earlier versions is vulnerable to Null pointer dereference in fluid_synth_monopoly.c,     that can be triggered when loading an invalid midi file. (CVE-2025-56225)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/282581">https://www.tenable.com/plugins/nessus/282581</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-67268]]></title>
            <link>https://www.tenable.com/plugins/nessus/281617</link>
            <guid>https://www.tenable.com/plugins/nessus/281617</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 281617 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the     drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS     Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the     skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing     a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially     arbitrary code execution. (CVE-2025-67268)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/281617">https://www.tenable.com/plugins/nessus/281617</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-67269]]></title>
            <link>https://www.tenable.com/plugins/nessus/281614</link>
            <guid>https://www.tenable.com/plugins/nessus/281614</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 281614 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd     versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the     payload length is calculated using `lexer->length = (size_t)c - 4` without checking if the input byte `c`     is less than 4. This results in an unsigned integer underflow, setting `lexer->length` to a very large     value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes,     causing 100% CPU utilization and a Denial of Service (DoS) condition. (CVE-2025-67269)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/281614">https://www.tenable.com/plugins/nessus/281614</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-69195]]></title>
            <link>https://www.tenable.com/plugins/nessus/281492</link>
            <guid>https://www.tenable.com/plugins/nessus/281492</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 281492 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename     sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction     options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon     user interaction with wget2, can lead to memory corruption. This can cause the application to crash and     potentially allow for further malicious activities. (CVE-2025-69195)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/281492">https://www.tenable.com/plugins/nessus/281492</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-69194]]></title>
            <link>https://www.tenable.com/plugins/nessus/281490</link>
            <guid>https://www.tenable.com/plugins/nessus/281490</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 281490 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to     properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this     behavior to write files to unintended locations on the system. This can lead to data loss or potentially     allow further compromise of the user's environment. (CVE-2025-69194)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/281490">https://www.tenable.com/plugins/nessus/281490</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-34457]]></title>
            <link>https://www.tenable.com/plugins/nessus/279645</link>
            <guid>https://www.tenable.com/plugins/nessus/279645</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279645 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-     based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When     processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function     appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an     out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading     to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated     attackers to trigger a denial-of-service condition. (CVE-2025-34457)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279645">https://www.tenable.com/plugins/nessus/279645</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-14876]]></title>
            <link>https://www.tenable.com/plugins/nessus/279386</link>
            <guid>https://www.tenable.com/plugins/nessus/279386</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279386 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a     missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a     denial of service (DoS) on the host system by causing the QEMU process to terminate unexpectedly.<br /></span><span>    (CVE-2025-14876)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279386">https://www.tenable.com/plugins/nessus/279386</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-68114]]></title>
            <link>https://www.tenable.com/plugins/nessus/279253</link>
            <guid>https://www.tenable.com/plugins/nessus/279253</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279253 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unchecked vsnprintf return in     SStream_concat lets a malicious cs_opt_mem.vsnprintf drive SStream's index negative or past the end,     leading to a stack buffer underflow/overflow when the next write occurs. Commit     2c7797182a1618be12017d7d41e0b6581d5d529e fixes the issue. (CVE-2025-68114)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279253">https://www.tenable.com/plugins/nessus/279253</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-67873]]></title>
            <link>https://www.tenable.com/plugins/nessus/279252</link>
            <guid>https://www.tenable.com/plugins/nessus/279252</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 279252 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdata length is not bounds-     checked, so a user-provided skipdata callback can make cs_disasm/cs_disasm_iter memcpy more than 24 bytes     into cs_insn.bytes, causing a heap buffer overflow in the disassembly path. Commit     cbef767ab33b82166d263895f24084b75b316df3 fixes the issue. (CVE-2025-67873)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/279252">https://www.tenable.com/plugins/nessus/279252</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-68146]]></title>
            <link>https://www.tenable.com/plugins/nessus/278912</link>
            <guid>https://www.tenable.com/plugins/nessus/278912</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 278912 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-     Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files     through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where     filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing     to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and     truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted.<br /></span><span>    The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability     to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation     succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1.<br /></span><span>    If immediate upgrade is not possible, use SoftFileLock instead of UnixFileLock/WindowsFileLock (note:<br /></span><span>    different locking semantics, may not be suitable for all use cases); ensure lock file directories have     restrictive permissions (chmod 0700) to prevent untrusted users from creating symlinks; and/or monitor     lock file directories for suspicious symlinks before running trusted applications. These workarounds     provide only partial mitigation. The race condition remains exploitable. Upgrading to version 3.20.1 is     strongly recommended. (CVE-2025-68146)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/278912">https://www.tenable.com/plugins/nessus/278912</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-49643]]></title>
            <link>https://www.tenable.com/plugins/nessus/277124</link>
            <guid>https://www.tenable.com/plugins/nessus/277124</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 277124 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver     by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.<br /></span><span>    (CVE-2025-49643)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/277124">https://www.tenable.com/plugins/nessus/277124</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-13699]]></title>
            <link>https://www.tenable.com/plugins/nessus/276980</link>
            <guid>https://www.tenable.com/plugins/nessus/276980</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 276980 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability     allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with     the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending     on the implementation. The specific flaw exists within the handling of view names. The issue results from     the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker     can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.<br /></span><span>    (CVE-2025-13699)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/276980">https://www.tenable.com/plugins/nessus/276980</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-63938]]></title>
            <link>https://www.tenable.com/plugins/nessus/276975</link>
            <guid>https://www.tenable.com/plugins/nessus/276975</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 276975 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Tinyproxy through 1.11.2 contains an integer overflow vulnerability in the strip_return_port() function     within src/reqs.c. (CVE-2025-63938)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/276975">https://www.tenable.com/plugins/nessus/276975</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-66034]]></title>
            <link>https://www.tenable.com/plugins/nessus/276970</link>
            <guid>https://www.tenable.com/plugins/nessus/276970</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 276970 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - fontTools is a library for manipulating fonts, written in Python. In versions from 4.33.0 to before     4.60.2, the fonttools varLib (or python3 -m fontTools.varLib) script has an arbitrary file write     vulnerability that leads to remote code execution when a malicious .designspace file is processed. The     vulnerability affects the main() code path of fontTools.varLib, used by the fonttools varLib CLI and any     code that invokes fontTools.varLib.main(). This issue has been patched in version 4.60.2. (CVE-2025-66034)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/276970">https://www.tenable.com/plugins/nessus/276970</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-62727]]></title>
            <link>https://www.tenable.com/plugins/nessus/271968</link>
            <guid>https://www.tenable.com/plugins/nessus/271968</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 271968 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Starlette is a lightweight ASGI framework/toolkit. Starting in version 0.39.0 and prior to version 0.49.1     , an unauthenticated attacker can send a crafted HTTP Range header that triggers quadratic-time processing     in Starlette's FileResponse Range parsing/merging logic. This enables CPU exhaustion per request, causing     denialofservice for endpoints serving files (e.g., StaticFiles or any use of FileResponse). This     vulnerability is fixed in 0.49.1. (CVE-2025-62727)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/271968">https://www.tenable.com/plugins/nessus/271968</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-49641]]></title>
            <link>https://www.tenable.com/plugins/nessus/269411</link>
            <guid>https://www.tenable.com/plugins/nessus/269411</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 269411 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the     problem.view.refresh action and therefore still retrieve a list of active problems. (CVE-2025-49641)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/269411">https://www.tenable.com/plugins/nessus/269411</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-27236]]></title>
            <link>https://www.tenable.com/plugins/nessus/269410</link>
            <guid>https://www.tenable.com/plugins/nessus/269410</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 269410 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A regular Zabbix user can search other users in their user group via Zabbix API by select fields the user     does not have access to view. This allows data-mining some field values the user does not have access to.<br /></span><span>    (CVE-2025-27236)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/269410">https://www.tenable.com/plugins/nessus/269410</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-27231]]></title>
            <link>https://www.tenable.com/plugins/nessus/269409</link>
            <guid>https://www.tenable.com/plugins/nessus/269409</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 269409 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by     changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on     'Host' change. (CVE-2025-27231)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/269409">https://www.tenable.com/plugins/nessus/269409</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-61985]]></title>
            <link>https://www.tenable.com/plugins/nessus/269333</link>
            <guid>https://www.tenable.com/plugins/nessus/269333</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 269333 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code     execution when a ProxyCommand is used. (CVE-2025-61985)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/269333">https://www.tenable.com/plugins/nessus/269333</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-61984]]></title>
            <link>https://www.tenable.com/plugins/nessus/269332</link>
            <guid>https://www.tenable.com/plugins/nessus/269332</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 269332 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly     untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted     sources are the command line and %-sequence expansion of a configuration file. (A configuration file that     provides a complete literal username is not categorized as an untrusted source.) (CVE-2025-61984)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/269332">https://www.tenable.com/plugins/nessus/269332</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-9648]]></title>
            <link>https://www.tenable.com/plugins/nessus/266288</link>
            <guid>https://www.tenable.com/plugins/nessus/266288</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 266288 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability in the CivetWeb library's function mg_handle_form_request allows remote attackers to     trigger a denial of service (DoS) condition. By sending a specially crafted HTTP POST request containing a     null byte in the payload, the server enters an infinite loop during form data parsing. Multiple malicious     requests will result in complete CPU exhaustion and render the service unresponsive to further requests.<br /></span><span>    This issue was fixed in commit 782e189. This issue affects only the library, standalone executable pre-     built by vendor is not affected. (CVE-2025-9648)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/266288">https://www.tenable.com/plugins/nessus/266288</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-48041]]></title>
            <link>https://www.tenable.com/plugins/nessus/264763</link>
            <guid>https://www.tenable.com/plugins/nessus/264763</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 264763 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules)     allows Excessive Allocation, Flooding. This vulnerability is associated with program files     lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and     26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12. (CVE-2025-48041)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/264763">https://www.tenable.com/plugins/nessus/264763</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-48039]]></title>
            <link>https://www.tenable.com/plugins/nessus/264760</link>
            <guid>https://www.tenable.com/plugins/nessus/264760</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 264760 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules)     allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files     lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and     26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12. (CVE-2025-48039)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/264760">https://www.tenable.com/plugins/nessus/264760</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-48038]]></title>
            <link>https://www.tenable.com/plugins/nessus/264752</link>
            <guid>https://www.tenable.com/plugins/nessus/264752</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 264752 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules)     allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files     lib/ssh/src/ssh_sftpd.erl. This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and     26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12. (CVE-2025-48038)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/264752">https://www.tenable.com/plugins/nessus/264752</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-48040]]></title>
            <link>https://www.tenable.com/plugins/nessus/264748</link>
            <guid>https://www.tenable.com/plugins/nessus/264748</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 264748 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive     Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl. This     issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from     3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12. (CVE-2025-48040)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/264748">https://www.tenable.com/plugins/nessus/264748</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-27238]]></title>
            <link>https://www.tenable.com/plugins/nessus/264706</link>
            <guid>https://www.tenable.com/plugins/nessus/264706</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 264706 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Due to a bug in Zabbix API, the hostprototype.get method lists all host prototypes to users that do not     have any user groups assigned to them. (CVE-2025-27238)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/264706">https://www.tenable.com/plugins/nessus/264706</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-27233]]></title>
            <link>https://www.tenable.com/plugins/nessus/264705</link>
            <guid>https://www.tenable.com/plugins/nessus/264705</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 264705 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Zabbix Agent 2 smartctl plugin does not properly sanitize smart.disk.get parameters, allowing an attacker     to inject unexpected arguments into the smartctl command. This can be used to leak the NTLMv2 hash from a     Windows system. (CVE-2025-27233)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/264705">https://www.tenable.com/plugins/nessus/264705</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-7709]]></title>
            <link>https://www.tenable.com/plugins/nessus/261660</link>
            <guid>https://www.tenable.com/plugins/nessus/261660</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 261660 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of     an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially     controlled data can then be written out of bounds. (CVE-2025-7709)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/261660">https://www.tenable.com/plugins/nessus/261660</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-55763]]></title>
            <link>https://www.tenable.com/plugins/nessus/260738</link>
            <guid>https://www.tenable.com/plugins/nessus/260738</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 260738 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to     achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request     processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or     arbitrary code execution. (CVE-2025-55763)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/260738">https://www.tenable.com/plugins/nessus/260738</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-2588]]></title>
            <link>https://www.tenable.com/plugins/nessus/258466</link>
            <guid>https://www.tenable.com/plugins/nessus/258466</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 258466 with Low Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - A vulnerability has been found in Hercules Augeas 1.14.1 and classified as problematic. This vulnerability     affects the function re_case_expand of the file src/fa.c. The manipulation of the argument re leads to     null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public     and may be used. (CVE-2025-2588)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/258466">https://www.tenable.com/plugins/nessus/258466</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-49589]]></title>
            <link>https://www.tenable.com/plugins/nessus/255563</link>
            <guid>https://www.tenable.com/plugins/nessus/255563</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 255563 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. A stack-based buffer overflow exists in the     Kprintf_HLE function of PCSX2 versions up to 2.3.414. Opening a disc image that logs a specially crafted     message may allow a remote attacker to execute arbitrary code if the user enabled IOP Console Logging.<br /></span><span>    This vulnerability is fixed in 2.3.414. (CVE-2025-49589)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/255563">https://www.tenable.com/plugins/nessus/255563</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2016-1000107]]></title>
            <link>https://www.tenable.com/plugins/nessus/254579</link>
            <guid>https://www.tenable.com/plugins/nessus/254579</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 254579 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect     applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which     might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy     server via a crafted Proxy header in an HTTP request, aka an httpoxy issue. (CVE-2016-1000107)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/254579">https://www.tenable.com/plugins/nessus/254579</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2024-47081]]></title>
            <link>https://www.tenable.com/plugins/nessus/248812</link>
            <guid>https://www.tenable.com/plugins/nessus/248812</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 248812 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc     credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4     to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with     `trust_env=False` on one's Requests Session. (CVE-2024-47081)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/248812">https://www.tenable.com/plugins/nessus/248812</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2017-17785]]></title>
            <link>https://www.tenable.com/plugins/nessus/221093</link>
            <guid>https://www.tenable.com/plugins/nessus/221093</guid>
            <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 221093 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-     fli/fli.c. (CVE-2017-17785)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/221093">https://www.tenable.com/plugins/nessus/221093</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[F5 Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/95388</link>
            <guid>https://www.tenable.com/plugins/nessus/95388</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 95388 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for F5 devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/95388">https://www.tenable.com/plugins/nessus/95388</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[F5 Settings]]></title>
            <link>https://www.tenable.com/plugins/nessus/95387</link>
            <guid>https://www.tenable.com/plugins/nessus/95387</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 95387 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>This plugin configures the F5 settings.<br /></span>
      <h3>Description</h3>
      <span>This script initializes the credentials used for F5 services.<br /></span><span><br /></span><span>To set the credentials, edit your scan policy and go to the 'Preferences -> F5 Settings' section.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/95387">https://www.tenable.com/plugins/nessus/95387</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Arista EOS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/92838</link>
            <guid>https://www.tenable.com/plugins/nessus/92838</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 92838 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Arista EOS devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/92838">https://www.tenable.com/plugins/nessus/92838</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenStack Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/86349</link>
            <guid>https://www.tenable.com/plugins/nessus/86349</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 86349 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for OpenStack.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/86349">https://www.tenable.com/plugins/nessus/86349</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OpenStack Settings]]></title>
            <link>https://www.tenable.com/plugins/nessus/86348</link>
            <guid>https://www.tenable.com/plugins/nessus/86348</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 86348 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>This plugin configures the OpenStack settings.<br /></span>
      <h3>Description</h3>
      <span>This script initializes the credentials used for OpenStack services.<br /></span><span><br /></span><span>To set the credentials, edit your scan policy and go to the 'Preferences -> OpenStack Settings' section.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/86348">https://www.tenable.com/plugins/nessus/86348</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[WatchGuard Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/86269</link>
            <guid>https://www.tenable.com/plugins/nessus/86269</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 86269 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for WatchGuard devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/86269">https://www.tenable.com/plugins/nessus/86269</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OVAL Windows Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/83189</link>
            <guid>https://www.tenable.com/plugins/nessus/83189</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 83189 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OVAL Compliance checks for Windows systems.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the policy specified by OVAL content.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/83189">https://www.tenable.com/plugins/nessus/83189</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[OVAL Linux Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/83188</link>
            <guid>https://www.tenable.com/plugins/nessus/83188</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 83188 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>OVAL Compliance checks for Linux systems.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the policy specified by OVAL content.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/83188">https://www.tenable.com/plugins/nessus/83188</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mobile Device Manager Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/81914</link>
            <guid>https://www.tenable.com/plugins/nessus/81914</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 81914 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Mobile Device Managers.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/81914">https://www.tenable.com/plugins/nessus/81914</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft Azure Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/79357</link>
            <guid>https://www.tenable.com/plugins/nessus/79357</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 79357 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Microsoft Azure.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/79357">https://www.tenable.com/plugins/nessus/79357</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rackspace Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/79356</link>
            <guid>https://www.tenable.com/plugins/nessus/79356</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 79356 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Rackspace.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/79356">https://www.tenable.com/plugins/nessus/79356</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Rackspace Settings]]></title>
            <link>https://www.tenable.com/plugins/nessus/79355</link>
            <guid>https://www.tenable.com/plugins/nessus/79355</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 79355 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>This plugin configures the Rackspace settings.<br /></span>
      <h3>Description</h3>
      <span>This script initializes the credentials used for Rackspace services.<br /></span><span><br /></span><span>To set the credentials, edit your scan policy and go to the 'Preferences -> Rackspace Settings' section.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/79355">https://www.tenable.com/plugins/nessus/79355</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEV Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/77090</link>
            <guid>https://www.tenable.com/plugins/nessus/77090</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 77090 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for RHEV.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/77090">https://www.tenable.com/plugins/nessus/77090</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Salesforce.com Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/76711</link>
            <guid>https://www.tenable.com/plugins/nessus/76711</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 76711 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Salesforce.com.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/76711">https://www.tenable.com/plugins/nessus/76711</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MongoDB Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/76513</link>
            <guid>https://www.tenable.com/plugins/nessus/76513</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 76513 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for MongoDB services.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/76513">https://www.tenable.com/plugins/nessus/76513</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[MongoDB Settings]]></title>
            <link>https://www.tenable.com/plugins/nessus/76512</link>
            <guid>https://www.tenable.com/plugins/nessus/76512</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 76512 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>This plugin configures the MongoDB settings.<br /></span>
      <h3>Description</h3>
      <span>This script initializes the credentials used for MongoDB services.<br /></span><span><br /></span><span>To set the credentials, edit your scan policy and go to the 'Preferences -> MongoDB Settings' section.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/76512">https://www.tenable.com/plugins/nessus/76512</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Huawei VRP Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/73157</link>
            <guid>https://www.tenable.com/plugins/nessus/73157</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 73157 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Huawei VRP devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/73157">https://www.tenable.com/plugins/nessus/73157</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Extreme ExtremeXOS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/73156</link>
            <guid>https://www.tenable.com/plugins/nessus/73156</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 73156 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Extreme ExtremeXOS devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/73156">https://www.tenable.com/plugins/nessus/73156</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Amazon AWS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/72426</link>
            <guid>https://www.tenable.com/plugins/nessus/72426</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 72426 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Amazon Web Services.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/72426">https://www.tenable.com/plugins/nessus/72426</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Unix File Contents Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/72095</link>
            <guid>https://www.tenable.com/plugins/nessus/72095</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 72095 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>File contents compliance checks.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a Unix file content compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/72095">https://www.tenable.com/plugins/nessus/72095</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adtran AOS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/71991</link>
            <guid>https://www.tenable.com/plugins/nessus/71991</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 71991 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Adtran AOS devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/71991">https://www.tenable.com/plugins/nessus/71991</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SonicWALL SonicOS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/71955</link>
            <guid>https://www.tenable.com/plugins/nessus/71955</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 71955 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for SonicWALL SonicOS devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/71955">https://www.tenable.com/plugins/nessus/71955</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Brocade FabricOS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/71842</link>
            <guid>https://www.tenable.com/plugins/nessus/71842</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 71842 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Brocade FabricOS devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/71842">https://www.tenable.com/plugins/nessus/71842</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[BlueCoat ProxySG Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/70470</link>
            <guid>https://www.tenable.com/plugins/nessus/70470</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 70470 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for BlueCoat ProxySG devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/70470">https://www.tenable.com/plugins/nessus/70470</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FireEye Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/70469</link>
            <guid>https://www.tenable.com/plugins/nessus/70469</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 70469 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for FireEye devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/70469">https://www.tenable.com/plugins/nessus/70469</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortigate FortiOS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/70272</link>
            <guid>https://www.tenable.com/plugins/nessus/70272</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 70272 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Fortigate FortiOS devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/70272">https://www.tenable.com/plugins/nessus/70272</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[HP ProCurve Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/70271</link>
            <guid>https://www.tenable.com/plugins/nessus/70271</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 70271 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for HP ProCurve devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/70271">https://www.tenable.com/plugins/nessus/70271</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NetApp Data ONTAP Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/66934</link>
            <guid>https://www.tenable.com/plugins/nessus/66934</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 66934 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for NetApp Data ONTAP devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/66934">https://www.tenable.com/plugins/nessus/66934</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SCAP Information]]></title>
            <link>https://www.tenable.com/plugins/nessus/66759</link>
            <guid>https://www.tenable.com/plugins/nessus/66759</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 66759 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>SCAP Compliance additional information for Linux/Windows systems.<br /></span>
      <h3>Description</h3>
      <span>This script reports additional SCAP content information.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/66759">https://www.tenable.com/plugins/nessus/66759</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SCAP XML Results]]></title>
            <link>https://www.tenable.com/plugins/nessus/66758</link>
            <guid>https://www.tenable.com/plugins/nessus/66758</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 66758 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>SCAP Compliance check results for Linux/Windows systems.<br /></span>
      <h3>Description</h3>
      <span>This script reports SCAP content results including attached ARF, OVAL, and XCCDF results.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/66758">https://www.tenable.com/plugins/nessus/66758</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SCAP Linux Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/66757</link>
            <guid>https://www.tenable.com/plugins/nessus/66757</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 66757 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>SCAP Compliance checks for Linux systems.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the policy specified by SCAP content.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/66757">https://www.tenable.com/plugins/nessus/66757</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[SCAP Windows Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/66756</link>
            <guid>https://www.tenable.com/plugins/nessus/66756</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 66756 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>SCAP Compliance checks for Windows systems.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the policy specified by SCAP content.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/66756">https://www.tenable.com/plugins/nessus/66756</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[VMware vCenter/vSphere Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/64455</link>
            <guid>https://www.tenable.com/plugins/nessus/64455</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 64455 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for VMware vCenter/vSphere devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/64455">https://www.tenable.com/plugins/nessus/64455</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Palo Alto Networks PAN-OS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/64095</link>
            <guid>https://www.tenable.com/plugins/nessus/64095</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 64095 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Palo Alto PAN-OS<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/64095">https://www.tenable.com/plugins/nessus/64095</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Juniper Junos Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/62680</link>
            <guid>https://www.tenable.com/plugins/nessus/62680</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 62680 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Juniper Junos devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/62680">https://www.tenable.com/plugins/nessus/62680</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Check Point GAiA Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/62679</link>
            <guid>https://www.tenable.com/plugins/nessus/62679</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 62679 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Check Point GAiA devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/62679">https://www.tenable.com/plugins/nessus/62679</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[IBM iSeries Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/57860</link>
            <guid>https://www.tenable.com/plugins/nessus/57860</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 57860 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for IBM iSeries devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/57860">https://www.tenable.com/plugins/nessus/57860</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Cisco IOS Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/46689</link>
            <guid>https://www.tenable.com/plugins/nessus/46689</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 46689 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for Cisco IOS devices.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/46689">https://www.tenable.com/plugins/nessus/46689</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Database Compliance Checks]]></title>
            <link>https://www.tenable.com/plugins/nessus/33814</link>
            <guid>https://www.tenable.com/plugins/nessus/33814</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 33814 with Info Severity</p>
      <h3>Synopsis</h3>
      <span>Compliance checks for database servers.<br /></span>
      <h3>Description</h3>
      <span>Using the supplied credentials, this script performs a compliance check against the given policy.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/33814">https://www.tenable.com/plugins/nessus/33814</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : .NET 9.0 (RHSA-2026:4450)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302042</link>
            <guid>https://www.tenable.com/plugins/nessus/302042</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302042 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for .NET 9.0.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:4450 advisory.<br /></span><span><br /></span><span>    .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new     APIs, and it includes a CLR implementation.<br /></span><span><br /></span><span>    New versions of .NET that address a security vulnerability are now available. The updated versions are     .NET SDK 9.0.115 and .NET Runtime 9.0.14.Security Fix(es):<br /></span><span><br /></span><span>    * .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127)<br /></span><span><br /></span><span>    * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL .NET 9.0 package based on the guidance in RHSA-2026:4450.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302042">https://www.tenable.com/plugins/nessus/302042</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : .NET 10.0 (RHSA-2026:4458)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302041</link>
            <guid>https://www.tenable.com/plugins/nessus/302041</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302041 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for .NET 10.0.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:4458 advisory.<br /></span><span><br /></span><span>    .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new     APIs, and it includes a CLR implementation.<br /></span><span><br /></span><span>    New versions of .NET that address a security vulnerability are now available. The updated versions are     .NET SDK 10.0.104 and .NET Runtime 10.0.4.Security Fix(es):<br /></span><span><br /></span><span>    * .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127)<br /></span><span><br /></span><span>    * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL .NET 10.0 package based on the guidance in RHSA-2026:4458.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302041">https://www.tenable.com/plugins/nessus/302041</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 10 : .NET 10.0 (RHSA-2026:4453)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302035</link>
            <guid>https://www.tenable.com/plugins/nessus/302035</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302035 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for .NET 10.0.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 10 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:4453 advisory.<br /></span><span><br /></span><span>    .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new     APIs, and it includes a CLR implementation.<br /></span><span><br /></span><span>    New versions of .NET that address a security vulnerability are now available. The updated versions are     .NET SDK 10.0.104 and .NET Runtime 10.0.4.Security Fix(es):<br /></span><span><br /></span><span>    * .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127)<br /></span><span><br /></span><span>    * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL .NET 10.0 package based on the guidance in RHSA-2026:4453.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302035">https://www.tenable.com/plugins/nessus/302035</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : .NET 10.0 (RHSA-2026:4445)]]></title>
            <link>https://www.tenable.com/plugins/nessus/302028</link>
            <guid>https://www.tenable.com/plugins/nessus/302028</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302028 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for .NET 10.0.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:4445 advisory.<br /></span><span><br /></span><span>    .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new     APIs, and it includes a CLR implementation.<br /></span><span><br /></span><span>    New versions of .NET that address a security vulnerability are now available. The updated versions are     .NET SDK 10.0.104 and .NET Runtime 10.0.4.Security Fix(es):<br /></span><span><br /></span><span>    * .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127)<br /></span><span><br /></span><span>    * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL .NET 10.0 package based on the guidance in RHSA-2026:4445.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302028">https://www.tenable.com/plugins/nessus/302028</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Debian dsa-6163 : affs-modules-6.1.0-43-4kc-malta-di - security update]]></title>
            <link>https://www.tenable.com/plugins/nessus/302008</link>
            <guid>https://www.tenable.com/plugins/nessus/302008</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302008 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Debian host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The remote Debian 12 host has packages installed that are affected by multiple vulnerabilities as referenced in the dsa-6163 advisory.<br /></span><span><br /></span><span>    - -------------------------------------------------------------------------     Debian Security Advisory DSA-6163-1                   security@debian.org     https://www.debian.org/security/                     Salvatore Bonaccorso     March 12, 2026                        https://www.debian.org/security/faq<br /></span><span>    - -------------------------------------------------------------------------<br /></span><span><br /></span><span>    Package        : linux     CVE ID         : CVE-2023-53424 CVE-2024-26822 CVE-2024-57895 CVE-2025-22026                      CVE-2025-23155 CVE-2025-37786 CVE-2025-37822 CVE-2025-37920                      CVE-2025-38201 CVE-2025-38643 CVE-2025-39763 CVE-2025-40082                      CVE-2025-40251 CVE-2025-68358 CVE-2025-71089 CVE-2025-71144                      CVE-2025-71220 CVE-2025-71222 CVE-2025-71224 CVE-2025-71232                      CVE-2025-71233 CVE-2025-71235 CVE-2025-71236 CVE-2025-71237                      CVE-2025-71238 CVE-2026-23111 CVE-2026-23112 CVE-2026-23169                      CVE-2026-23176 CVE-2026-23178 CVE-2026-23180 CVE-2026-23182                      CVE-2026-23187 CVE-2026-23190 CVE-2026-23193 CVE-2026-23198                      CVE-2026-23202 CVE-2026-23205 CVE-2026-23206 CVE-2026-23209                      CVE-2026-23216 CVE-2026-23220 CVE-2026-23221 CVE-2026-23222                      CVE-2026-23228 CVE-2026-23229 CVE-2026-23230 CVE-2026-23234                      CVE-2026-23235 CVE-2026-23236 CVE-2026-23237 CVE-2026-23238<br /></span><span><br /></span><span>    Several vulnerabilities have been discovered in the Linux kernel that     may lead to a privilege escalation, denial of service or information     leaks.<br /></span><span><br /></span><span>    The Qualys Threat Research Unit (TRU) discovered several vulnerabilities     in Apparmor. Details can be found in the Qualys advisory at     https://www.qualys.com/2026/03/10/crack-armor.txt<br /></span><span><br /></span><span>    For the oldstable distribution (bookworm), these problems have been fixed     in version 6.1.164-1.<br /></span><span><br /></span><span>    We recommend that you upgrade your linux packages.<br /></span><span><br /></span><span>    For the detailed security status of linux please refer to its security     tracker page at:<br /></span><span>    https://security-tracker.debian.org/tracker/linux<br /></span><span><br /></span><span>    Further information about Debian Security Advisories, how to apply     these updates to your system and frequently asked questions can be     found at: https://www.debian.org/security/<br /></span><span><br /></span><span>    Mailing list: debian-security-announce@lists.debian.org<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Debian security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade the affs-modules-6.1.0-43-4kc-malta-di packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302008">https://www.tenable.com/plugins/nessus/302008</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 146.0.7680.75 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nessus/302007</link>
            <guid>https://www.tenable.com/plugins/nessus/302007</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302007 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote Windows host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote Windows host is prior to 146.0.7680.75. It is, therefore, affected by a vulnerability as referenced in the 2026_03_stable-channel-update-for-desktop_12 advisory.<br /></span><span><br /></span><span>  - Inappropriate implementation in V8. (CVE-2026-3910)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 146.0.7680.75 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302007">https://www.tenable.com/plugins/nessus/302007</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 146.0.7680.75 Vulnerability]]></title>
            <link>https://www.tenable.com/plugins/nessus/302006</link>
            <guid>https://www.tenable.com/plugins/nessus/302006</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302006 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote macOS host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote macOS host is prior to 146.0.7680.75. It is, therefore, affected by a vulnerability as referenced in the 2026_03_stable-channel-update-for-desktop_12 advisory.<br /></span><span><br /></span><span>  - Inappropriate implementation in V8. (CVE-2026-3910)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 146.0.7680.75 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302006">https://www.tenable.com/plugins/nessus/302006</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2808]]></title>
            <link>https://www.tenable.com/plugins/nessus/302002</link>
            <guid>https://www.tenable.com/plugins/nessus/302002</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 302002 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - HashiCorp Consul and Consul Enterprise 1.18.20 up to 1.21.10 and 1.22.4 are vulnerable to arbitrary file     read when configured with Kubernetes authentication. This vulnerability, CVE-2026-2808, is fixed in Consul     1.18.21, 1.21.11 and 1.22.5. (CVE-2026-2808)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/302002">https://www.tenable.com/plugins/nessus/302002</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-28356 (deprecated)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301999</link>
            <guid>https://www.tenable.com/plugins/nessus/301999</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301999 with High Severity</p>
      <h3>Synopsis</h3>
      <span>This plugin has been deprecated.<br /></span>
      <h3>Description</h3>
      <span>This plugin has been deprecated because all CVEs referenced were rejected.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301999">https://www.tenable.com/plugins/nessus/301999</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[EcoStruxure IT Data Center Expert <= 9.0 Use of Hard-coded Credentials (SEVD-2026-069-05)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301998</link>
            <guid>https://www.tenable.com/plugins/nessus/301998</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301998 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote web server contains an application that is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of EcoStruxure IT Data Center Expert installed on the remote host is 9.0 or prior. It is, therefore, affected by a vulnerability as referenced in the SEVD-2026-069-05 advisory.<br /></span><span><br /></span><span>  - Use of Hard-coded Credentials vulnerability exists that could cause information disclosure and remote     code execution when SOCKS Proxy is enabled, and administrator credentials and PostgreSQL database credentials are     known. SOCKS Proxy is disabled by default. (CVE-2025-13957)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to EcoStruxure IT Data Center Expert version 9.1 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301998">https://www.tenable.com/plugins/nessus/301998</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Substance 3D Painter < 11.1.3 (APSB26-25)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301997</link>
            <guid>https://www.tenable.com/plugins/nessus/301997</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301997 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Substance 3D Painter installed on the remote host is prior to 11.1.3. It is, therefore, affected by multiple vulnerabilities as referenced in the APSB26-25 advisory.<br /></span><span>  - Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that     could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application,     causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a     malicious file. (CVE-2026-21363)   <br /></span><span>  - Substance3D - Painter versions 11.1.2 and earlier are affected by an out-of-bounds read vulnerability that     could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive information     stored in memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file.<br /></span><span>    (CVE-2026-21365)   <br /></span><span>  - Substance3D - Painter versions 11.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that     could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application,     causing disruption to services. Exploitation of this issue requires user interaction in that a victim must open a     malicious file. (CVE-2026-27214)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Substance 3D Painter version 11.1.3 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301997">https://www.tenable.com/plugins/nessus/301997</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Substance 3D Stager < 3.1.8 Multiple Vulnerabilities (APSB26-29)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301996</link>
            <guid>https://www.tenable.com/plugins/nessus/301996</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301996 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing one or more security updates.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Substance 3D Stager installed on the remote host is prior to 3.1.8. It is, therefore, affected by an multiple vulnerabilities as referenced in the APSB26-29 advisory.<br /></span><span><br /></span><span>  - Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability     that could result in arbitrary code execution in the context of the current user. Exploitation of     this issue requires user interaction in that a victim must open a malicious file. (CVE-2026-27273)<br /></span><span><br /></span><span>  - Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability     that could result in arbitrary code execution in the context of the current user. Exploitation of     this issue requires user interaction in that a victim must open a malicious file. (CVE-2026-27277)<br /></span><span><br /></span><span>  - Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability     that could result in arbitrary code execution in the context of the current user. Exploitation of     this issue requires user interaction in that a victim must open a malicious file. (CVE-2026-27279)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Substance 3D Stager version 3.1.8 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301996">https://www.tenable.com/plugins/nessus/301996</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[CKEditor < 47.6.0 XSS]]></title>
            <link>https://www.tenable.com/plugins/nessus/301995</link>
            <guid>https://www.tenable.com/plugins/nessus/301995</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301995 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote web server may be affected by a cross site scripting vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of CKEditor included on the remote web host prior to 47.6.0. It may, therefore, be affected by a cross-site scripting (XSS) vulnerability. <br /></span><span><br /></span><span>  - CKEditor 5 is a modern JavaScript rich-text editor with an MVC architecture. Prior to version 47.6.0, a     cross-site scripting (XSS) vulnerability has been discovered in the General HTML Support feature. This     vulnerability could be triggered by inserting specially crafted markup, leading to unauthorized     JavaScript code execution, if the editor instance used an unsafe General HTML Support configuration. This     issue has been patched in version 47.6.0. (CVE-2026-28343)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to CKEditor 47.6.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301995">https://www.tenable.com/plugins/nessus/301995</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Microsoft ASP.NET Core DoS (March 2026)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301994</link>
            <guid>https://www.tenable.com/plugins/nessus/301994</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301994 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host is affected by a denial of service vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of ASP.NET Core installed on the remote Windows host is 8.0.x prior to 8.0.25, 9.0.x prior to 9.0.14, or 10.0.x prior to 10.0.4. It is, therefore, affected by a denial of service vulnerability. A specially crafted message to a SignalR server can cause uncontrolled resource consumption, exhausting an internal buffer and leading to denial of service.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update ASP.NET Core to version 8.0.25, 9.0.14, 10.0.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301994">https://www.tenable.com/plugins/nessus/301994</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 9 : .NET 9.0 (RHSA-2026:4456)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301985</link>
            <guid>https://www.tenable.com/plugins/nessus/301985</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301985 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for .NET 9.0.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:4456 advisory.<br /></span><span><br /></span><span>    .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new     APIs, and it includes a CLR implementation.<br /></span><span><br /></span><span>    New versions of .NET that address a security vulnerability are now available. The updated versions are     .NET SDK 9.0.115 and .NET Runtime 9.0.14.Security Fix(es):<br /></span><span><br /></span><span>    * .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127)<br /></span><span><br /></span><span>    * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL .NET 9.0 package based on the guidance in RHSA-2026:4456.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301985">https://www.tenable.com/plugins/nessus/301985</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[NetApp ONTAP S3 Information Disclosure Vulnerability (NTAP-20260304-0001)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301982</link>
            <guid>https://www.tenable.com/plugins/nessus/301982</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301982 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is affected by an Information Disclosure Vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of NetApp ONTAP running on the remote host is 9.12.1 prior to 9.12.1P20, 9.13.x prior to 9.13.1P19, 9.14.x prior to 9.14.1P16, 9.15.x prior to 9.15.1P16, 9.16.x prior to 9.16.1P8, 9.17.x prior to 9.17.1P1, or 9.18.x prior to 9.18.1. It is, therefore, affected by an Information Disclosure Vulnerability as detailed in the NTAP-20260304-0001 advisory.<br /></span><span><br /></span><span>  - ONTAP versions 9.12.1 and higher with S3 NAS buckets are susceptible to an information disclosure vulnerability.<br /></span><span>    Successful exploit could allow an authenticated attacker to view a listing of the contents in a directory for     which they lack permission. (CVE-2026-22052)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to NetApp ONTAP version 9.12.1P20, 9.13.1P19, 9.14.1P16, 9.15.1P16, 9.16.1P8, 9.17.1P1, 9.18.1, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301982">https://www.tenable.com/plugins/nessus/301982</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Docker Desktop < 4.64.0 CLI Plugin Directory Privilege Escalation (CVE-2025-15558)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301978</link>
            <guid>https://www.tenable.com/plugins/nessus/301978</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301978 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Windows host has an application installed that is affected by a privilege escalation vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Docker Desktop for Windows installed on the remote host is 4.34.x < 4.64.0. It is, therefore, affected by a privilege escalation vulnerability.<br /></span><span><br /></span><span>  - Docker CLI for Windows searches for plugin binaries in     C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create     this directory and place malicious CLI plugin binaries (docker-compose.exe, docker-buildx.exe, etc.) that are executed     when a victim user opens Docker Desktop or invokes Docker CLI plugin features, allowing privilege escalation if the     docker CLI is executed as a privileged user.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Docker Desktop version 4.64.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301978">https://www.tenable.com/plugins/nessus/301978</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache ZooKeeper 3.9.x < 3.9.4 Improper Permission Check]]></title>
            <link>https://www.tenable.com/plugins/nessus/301977</link>
            <guid>https://www.tenable.com/plugins/nessus/301977</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301977 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache ZooKeeper server is affected by an improper permission check vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Apache ZooKeeper listening on the remote host is 3.9.x prior to 3.9.4. It is, therefore, affected by an improper permission check vulnerability:<br /></span><span><br /></span><span>  - Improper permission check in ZooKeeper AdminServer lets authorized clients to run snapshot     and restore commands with insufficient permissions. The issue can be mitigated by disabling     both commands (via admin.snapshot.enabled and admin.restore.enabled), disabling the whole     AdminServer interface (via admin.enableServer), or ensuring that the root ACL does not     provide open permissions. (CVE-2025-58457)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Apache ZooKeeper 3.9.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301977">https://www.tenable.com/plugins/nessus/301977</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apache ZooKeeper 3.8.x < 3.8.6 / 3.9.x < 3.9.5 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/301976</link>
            <guid>https://www.tenable.com/plugins/nessus/301976</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301976 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Apache ZooKeeper server is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Apache ZooKeeper listening on the remote host is 3.8.x prior to 3.8.6 or 3.9.x prior to 3.9.5. It is, therefore, affected by multiple vulnerabilities:<br /></span><span><br /></span><span>  - Improper handling of configuration values in ZKConfig allows an attacker to expose sensitive     information stored in client configuration in the client's logfile. Configuration values are     exposed at INFO level logging, rendering potential production systems affected by the issue.<br /></span><span>    (CVE-2026-24308)<br /></span><span><br /></span><span>  - Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR)     when IP SAN validation fails, allowing attackers who control or spoof PTR records to     impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. Note     that an attacker must present a certificate which is trusted by ZKTrustManager, which makes     the attack vector harder to exploit. (CVE-2026-24281)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update to Apache ZooKeeper 3.8.6 or 3.9.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301976">https://www.tenable.com/plugins/nessus/301976</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Ingress-NGINX Controller < 1.13.8 / 1.14.x < 1.14.4 / 1.15.x < 1.15.0 Configuration Injection]]></title>
            <link>https://www.tenable.com/plugins/nessus/301974</link>
            <guid>https://www.tenable.com/plugins/nessus/301974</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301974 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The version of Ingress-NGINX controller installed on the remote host is prior to 1.13.8, 1.14.4, or 1.15.0. It is, therefore, affected by a configuration injection vulnerability.<br /></span><span><br /></span><span>A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. Note that in the default installation, the controller can access all Secrets cluster-wide.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Ingress-NGINX Controller 1.13.8, 1.14.4, 1.15.0, or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301974">https://www.tenable.com/plugins/nessus/301974</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23907]]></title>
            <link>https://www.tenable.com/plugins/nessus/301969</link>
            <guid>https://www.tenable.com/plugins/nessus/301969</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301969 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - This issue affects the ExtractEmbeddedFiles example in Apache PDFBox: from 2.0.24 through 2.0.35, from     3.0.0 through 3.0.6. The ExtractEmbeddedFiles example contains a path traversal vulnerability (CWE-22)     because the filename that is obtained from PDComplexFileSpecification.getFilename() is appended to the     extraction path. Users who have copied this example into their production code should review it to ensure     that the extraction path is acceptable. The example has been changed accordingly, now the initial path and     the extraction paths are converted into canonical paths and it is verified that extraction path contains     the initial path. The documentation has also been adjusted. (CVE-2026-23907)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301969">https://www.tenable.com/plugins/nessus/301969</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[RHEL 8 : .NET 9.0 (RHSA-2026:4443)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301939</link>
            <guid>https://www.tenable.com/plugins/nessus/301939</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301939 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote Red Hat host is missing one or more security updates for .NET 9.0.<br /></span>
      <h3>Description</h3>
      <span>The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2026:4443 advisory.<br /></span><span><br /></span><span>    .NET is a managed-software framework. It implements a subset of the .NET framework APIs and several new     APIs, and it includes a CLR implementation.<br /></span><span><br /></span><span>    New versions of .NET that address a security vulnerability are now available. The updated versions are     .NET SDK 9.0.115 and .NET Runtime 9.0.14.Security Fix(es):<br /></span><span><br /></span><span>    * .net: .NET: Denial of Service via out-of-bounds read (CVE-2026-26127)<br /></span><span><br /></span><span>    * asp.net: ASP.NET Core: Denial of Service via uncontrolled resource allocation (CVE-2026-26130)<br /></span><span><br /></span><span>    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the RHEL .NET 9.0 package based on the guidance in RHSA-2026:4443.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301939">https://www.tenable.com/plugins/nessus/301939</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 146.0.7680.71 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/301924</link>
            <guid>https://www.tenable.com/plugins/nessus/301924</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301924 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote macOS host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote macOS host is prior to 146.0.7680.71. It is, therefore, affected by multiple vulnerabilities as referenced in the 2026_03_stable-channel-update-for-desktop_10 advisory.<br /></span><span><br /></span><span>  - Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3936)<br /></span><span><br /></span><span>  - Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)     (CVE-2026-3913)<br /></span><span><br /></span><span>  - Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially     exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3914)<br /></span><span><br /></span><span>  - Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform     an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3915)<br /></span><span><br /></span><span>  - Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)     (CVE-2026-3916)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 146.0.7680.71 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301924">https://www.tenable.com/plugins/nessus/301924</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Google Chrome < 146.0.7680.71 Multiple Vulnerabilities]]></title>
            <link>https://www.tenable.com/plugins/nessus/301923</link>
            <guid>https://www.tenable.com/plugins/nessus/301923</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301923 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Google Chrome installed on the remote Windows host is prior to 146.0.7680.71. It is, therefore, affected by multiple vulnerabilities as referenced in the 2026_03_stable-channel-update-for-desktop_10 advisory.<br /></span><span><br /></span><span>  - Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)     (CVE-2026-3936)<br /></span><span><br /></span><span>  - Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)     (CVE-2026-3913)<br /></span><span><br /></span><span>  - Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially     exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3914)<br /></span><span><br /></span><span>  - Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform     an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) (CVE-2026-3915)<br /></span><span><br /></span><span>  - Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to     potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)     (CVE-2026-3916)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Google Chrome version 146.0.7680.71 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301923">https://www.tenable.com/plugins/nessus/301923</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GitLab 8.14 < 18.7.6 / 18.8 < 18.8.6 / 18.9 < 18.9.2 (CVE-2026-1182)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301912</link>
            <guid>https://www.tenable.com/plugins/nessus/301912</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301912 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability, as follows:<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.14 before 18.7.6, 18.8 before     18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to gain unauthorized access     to confidential issue title created in public projects under certain circumstances. (CVE-2026-1182)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GitLab version 18.7.6, 18.8.6, 18.9.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301912">https://www.tenable.com/plugins/nessus/301912</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31870]]></title>
            <link>https://www.tenable.com/plugins/nessus/301900</link>
            <guid>https://www.tenable.com/plugins/nessus/301900</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301900 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a     cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library     calls std::stoull() directly on the Content-Length header value received from the server with no input     validation and no exception handling. std::stoull throws std::invalid_argument for non-numeric strings and     std::out_of_range for values exceeding ULLONG_MAX. Since nothing catches these exceptions, the C++ runtime     calls std::terminate(), which kills the process with SIGABRT. Any server the client connects to     including servers reached via HTTP redirects, third-party APIs, or man-in-the-middle positions can crash     the client application with a single HTTP response. No authentication is required. No interaction from the     end user is required. The crash is deterministic and immediate. This vulnerability is fixed in 0.37.1.<br /></span><span>    (CVE-2026-31870)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301900">https://www.tenable.com/plugins/nessus/301900</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31958]]></title>
            <link>https://www.tenable.com/plugins/nessus/301899</link>
            <guid>https://www.tenable.com/plugins/nessus/301899</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301899 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Tornado is a Python web framework and asynchronous networking library. In versions of Tornado prior to     6.5.5, the only limit on the number of parts in multipart/form-data is the max_body_size setting (default     100MB). Since parsing occurs synchronously on the main thread, this creates the possibility of denial-of-     service due to the cost of parsing very large multipart bodies with many parts. This vulnerability is     fixed in 6.5.5. (CVE-2026-31958)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301899">https://www.tenable.com/plugins/nessus/301899</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Apple iOS < 16.7.15 Vulnerability (126646)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301894</link>
            <guid>https://www.tenable.com/plugins/nessus/301894</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301894 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Apple iOS running on the mobile device is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Apple iOS running on the mobile device is prior to 16.7.15. It is, therefore, affected by a vulnerability.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Apple iOS version 16.7.15 or later<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301894">https://www.tenable.com/plugins/nessus/301894</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[FreeBSD : curl -- Multiple vulnerabilties (1933737d-1d46-11f1-81da-8447094a420f)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301882</link>
            <guid>https://www.tenable.com/plugins/nessus/301882</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301882 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote FreeBSD host is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 1933737d-1d46-11f1-81da-8447094a420f advisory.<br /></span><span><br /></span><span>    The curl project reports:<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the FreeBSD security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected packages.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301882">https://www.tenable.com/plugins/nessus/301882</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GitLab 14.4 < 18.7.6 / 18.8 < 18.8.6 / 18.9 < 18.9.2 (CVE-2026-1663)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301879</link>
            <guid>https://www.tenable.com/plugins/nessus/301879</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301879 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability, as follows:<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.4 before 18.7.6, 18.8 before     18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user with group import permissions     to create labels in private projects due to improper authorization validation in the group import process     under certain circumstances. (CVE-2026-1663)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GitLab version 18.7.6, 18.8.6, 18.9.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301879">https://www.tenable.com/plugins/nessus/301879</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GitLab 8.11 < 18.7.6 / 18.8 < 18.8.6 / 18.9 < 18.9.2 (CVE-2026-3848)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301877</link>
            <guid>https://www.tenable.com/plugins/nessus/301877</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301877 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability, as follows:<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.11 before 18.7.6, 18.8 before     18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to make unintended internal     requests through proxy environments under certain conditions due to improper input validation in import     functionality. (CVE-2026-3848)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GitLab version 18.7.6, 18.8.6, 18.9.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301877">https://www.tenable.com/plugins/nessus/301877</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GitLab 12.6 < 18.7.6 / 18.8 < 18.8.6 / 18.9 < 18.9.2 (CVE-2026-1732)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301876</link>
            <guid>https://www.tenable.com/plugins/nessus/301876</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301876 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability, as follows:<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.6 before 18.7.6, 18.8 before     18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to disclose confidential     issue titles due to improper filtering under certain circumstances. (CVE-2026-1732)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GitLab version 18.7.6, 18.8.6, 18.9.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301876">https://www.tenable.com/plugins/nessus/301876</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Splunk Enterprise 9.3.0 < 9.3.10, 9.4.0 < 9.4.9, 10.0.0 < 10.0.4 (SVD-2026-0302)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301874</link>
            <guid>https://www.tenable.com/plugins/nessus/301874</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301874 with High Severity</p>
      <h3>Synopsis</h3>
      <span>An application running on a remote web server host is affected by a vulnerability<br /></span>
      <h3>Description</h3>
      <span>The version of Splunk installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the SVD-2026-0302 advisory.<br /></span><span><br /></span><span>  - In Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions     below 10.2.2510.5, 10.0.2503.12, 10.1.2507.16, and 9.3.2411.124, a user who holds a role that contains the     high-privilege capability `edit_cmd` could execute arbitrary shell commands using the `unarchive_cmd`     parameter for the `/splunkd/__upload/indexing/preview` REST endpoint. (CVE-2026-20163)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade Splunk Enterprise to versions 10.2.0, 10.0.4, 9.4.9, 9.3.10, or higher.Splunk is actively monitoring and patching Splunk Cloud Platform instances.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301874">https://www.tenable.com/plugins/nessus/301874</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GitLab 1.0 < 18.7.6 / 18.8 < 18.8.6 / 18.9 < 18.9.2 (CVE-2026-1230)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301863</link>
            <guid>https://www.tenable.com/plugins/nessus/301863</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301863 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability, as follows:<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 1.0 before 18.7.6, 18.8 before     18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user to cause repository downloads     to contain different code than displayed in the web interface due to incorrect validation of branch     references under certain circumstances. (CVE-2026-1230)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GitLab version 18.7.6, 18.8.6, 18.9.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301863">https://www.tenable.com/plugins/nessus/301863</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GitLab 18.9 < 18.9.2 (CVE-2026-1069)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301862</link>
            <guid>https://www.tenable.com/plugins/nessus/301862</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301862 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability, as follows:<br /></span><span><br /></span><span>  - GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9 before 18.9.2...<br /></span><span>    (CVE-2026-1069)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GitLab version 18.9.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301862">https://www.tenable.com/plugins/nessus/301862</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[GitLab 15.6 < 18.7.6 / 18.8 < 18.8.6 / 18.9 < 18.9.2 (CVE-2026-0602)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301861</link>
            <guid>https://www.tenable.com/plugins/nessus/301861</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301861 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of GitLab installed on the remote host is affected by a vulnerability, as follows:<br /></span><span><br /></span><span>  - Authentication Bypass Using an Alternate Path or Channel in GitLab (CVE-2026-0602)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to GitLab version 18.7.6, 18.8.6, 18.9.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301861">https://www.tenable.com/plugins/nessus/301861</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zabbix 6.0.x < 6.0.41 / 7.0.x < 7.0.18 / 7.4.x < 7.4.2 Unauthorized Object Creation (ZBX-27567)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301859</link>
            <guid>https://www.tenable.com/plugins/nessus/301859</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301859 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>A web application running on the remote host is affected by an authorization bypass vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Zabbix installed on the remote host is affected by an authorization bypass vulnerability. An authenticated low-privilege user (User role) possessing template and host write permissions can exploit the configuration.import API to create unauthorized objects, despite the User role typically lacking authority to create or modify templates and hosts.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zabbix version 6.0.41, 7.0.18, 7.4.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301859">https://www.tenable.com/plugins/nessus/301859</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3784]]></title>
            <link>https://www.tenable.com/plugins/nessus/301855</link>
            <guid>https://www.tenable.com/plugins/nessus/301855</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301855 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new     request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate     connection. (CVE-2026-3784)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301855">https://www.tenable.com/plugins/nessus/301855</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3805]]></title>
            <link>https://www.tenable.com/plugins/nessus/301854</link>
            <guid>https://www.tenable.com/plugins/nessus/301854</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301854 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing     into already freed memory. (CVE-2026-3805)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301854">https://www.tenable.com/plugins/nessus/301854</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-26130 (deprecated)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301853</link>
            <guid>https://www.tenable.com/plugins/nessus/301853</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301853 with High Severity</p>
      <h3>Synopsis</h3>
      <span>This plugin has been deprecated.<br /></span>
      <h3>Description</h3>
      <span>This plugin has been deprecated because all CVEs referenced were rejected.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301853">https://www.tenable.com/plugins/nessus/301853</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-26127 (deprecated)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301852</link>
            <guid>https://www.tenable.com/plugins/nessus/301852</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301852 with High Severity</p>
      <h3>Synopsis</h3>
      <span>This plugin has been deprecated.<br /></span>
      <h3>Description</h3>
      <span>This plugin has been deprecated because all CVEs referenced were rejected.<br /></span>
      <h3>Solution</h3>
      <span>null<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301852">https://www.tenable.com/plugins/nessus/301852</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-3783]]></title>
            <link>https://www.tenable.com/plugins/nessus/301851</link>
            <guid>https://www.tenable.com/plugins/nessus/301851</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301851 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a     second URL, curl could leak that token to the second hostname under some circumstances. If the hostname     that the first request is redirected to has information in the used .netrc file, with either of the     `machine` or `default` keywords, curl would pass on the bearer token set for the first host also to the     second one. (CVE-2026-3783)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301851">https://www.tenable.com/plugins/nessus/301851</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-28292]]></title>
            <link>https://www.tenable.com/plugins/nessus/301850</link>
            <guid>https://www.tenable.com/plugins/nessus/301850</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301850 with Critical Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - `simple-git`, an interface for running git commands in any node.js application, has an issue in versions     3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and     CVE-2022-25912) and achieve full remote code execution on the host machine. Version 3.23.0 contains an     updated fix for the vulnerability. (CVE-2026-28292)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301850">https://www.tenable.com/plugins/nessus/301850</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-1965]]></title>
            <link>https://www.tenable.com/plugins/nessus/301847</link>
            <guid>https://www.tenable.com/plugins/nessus/301847</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301847 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated     HTTP or HTTPS request. libcurl features a pool of recent connections so that subsequent requests can reuse     an existing connection to avoid overhead. When reusing a connection a range of criterion must first be     met. Due to a logical error in the code, a request that was issued by an application could wrongfully     reuse an existing connection to the same server that was authenticated using different credentials. One     underlying reason being that Negotiate sometimes authenticates *connections* and not *requests*, contrary     to how HTTP is designed to work. An application that allows Negotiate authentication to a server (that     responds wanting Negotiate) with `user1:password1` and then does another operation to the same server also     using Negotiate but with `user2:password2` (while the previous connection is still alive) - the second     request wrongly reused the same connection and since it then sees that the Negotiate negotiation is     already made, it just sends the request over that connection thinking it uses the user2 credentials when     it is in fact still using the connection authenticated for user1... The set of authentication methods to     use is set with `CURLOPT_HTTPAUTH`. Applications can disable libcurl's reuse of connections and thus     mitigate this problem, by using one of the following libcurl options to alter how connections are or are     not reused: `CURLOPT_FRESH_CONNECT`, `CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using     the curl_multi API). (CVE-2026-1965)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301847">https://www.tenable.com/plugins/nessus/301847</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[openSUSE 15 Security Update : python-Markdown (SUSE-SU-2026:0846-1)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301810</link>
            <guid>https://www.tenable.com/plugins/nessus/301810</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301810 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The remote openSUSE host is missing a security update.<br /></span>
      <h3>Description</h3>
      <span>The remote openSUSE 15 host has a package installed that is affected by a vulnerability as referenced in the SUSE- SU-2026:0846-1 advisory.<br /></span><span><br /></span><span>    This update for python-Markdown fixes the following issue:<br /></span><span><br /></span><span>    - CVE-2025-69534: incomplete markup declaration in raw HTML can crash applications that process untrusted     Markdown       (bsc#1259256).<br /></span><span><br /></span><span>Tenable has extracted the preceding description block directly from the SUSE security advisory.<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Update the affected python311-Markdown package.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301810">https://www.tenable.com/plugins/nessus/301810</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-2436]]></title>
            <link>https://www.tenable.com/plugins/nessus/301794</link>
            <guid>https://www.tenable.com/plugins/nessus/301794</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301794 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Debian Linux - libsoup2.4 - None  libsoup3 - None  Red Hat Enterprise Linux - libsoup: libsoup: Denial of     Service via use-after-free in SoupServer during TLS handshake  Ubuntu Linux - [Unknown description]     (CVE-2026-2436)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301794">https://www.tenable.com/plugins/nessus/301794</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23240]]></title>
            <link>https://www.tenable.com/plugins/nessus/301793</link>
            <guid>https://www.tenable.com/plugins/nessus/301793</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301793 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - tls: Fix race condition in tls_sw_cancel_work_tx() This issue was discovered during a code audit. After     cancel_delayed_work_sync() is called from tls_sk_proto_close(), tx_work_handler() can still be scheduled     from paths such as the Delayed ACK handler or ksoftirqd. As a result, the tx_work_handler() worker may     dereference a freed TLS object. The following is a simple race scenario: cpu0 cpu1 tls_sk_proto_close()     tls_sw_cancel_work_tx() tls_write_space() tls_sw_write_space() if (!test_and_set_bit(BIT_TX_SCHEDULED,     &tx_ctx->tx_bitmask)) set_bit(BIT_TX_SCHEDULED, &ctx->tx_bitmask);<br /></span><span>    cancel_delayed_work_sync(&ctx->tx_work.work); schedule_delayed_work(&tx_ctx->tx_work.work, 0); To prevent     this race condition, cancel_delayed_work_sync() is replaced with disable_delayed_work_sync().<br /></span><span>    (CVE-2026-23240)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301793">https://www.tenable.com/plugins/nessus/301793</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-31812]]></title>
            <link>https://www.tenable.com/plugins/nessus/301791</link>
            <guid>https://www.tenable.com/plugins/nessus/301791</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301791 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC transport protocol. Prior to     0.11.14, a remote, unauthenticated attacker can trigger a denial of service in applications using     vulnerable quinn versions by sending a crafted QUIC Initial packet containing malformed     quic_transport_parameters. In quinn-proto parsing logic, attacker-controlled varints are decoded with     unwrap(), so truncated encodings cause Err(UnexpectedEnd) and panic. This is reachable over the network     with a single packet and no prior trust or authentication. This vulnerability is fixed in 0.11.14.<br /></span><span>    (CVE-2026-31812)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301791">https://www.tenable.com/plugins/nessus/301791</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23868]]></title>
            <link>https://www.tenable.com/plugins/nessus/301790</link>
            <guid>https://www.tenable.com/plugins/nessus/301790</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301790 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Giflib contains a double-free vulnerability that is the result of a shallow copy in GifMakeSavedImage and     incorrect error handling. The conditions needed to trigger this vulnerability are difficult but may be     possible. (CVE-2026-23868)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301790">https://www.tenable.com/plugins/nessus/301790</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-23239]]></title>
            <link>https://www.tenable.com/plugins/nessus/301785</link>
            <guid>https://www.tenable.com/plugins/nessus/301785</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301785 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - espintcp: Fix race condition in espintcp_close() This issue was discovered during a code audit. After     cancel_work_sync() is called from espintcp_close(), espintcp_tx_work() can still be scheduled from paths     such as the Delayed ACK handler or ksoftirqd. As a result, the espintcp_tx_work() worker may dereference a     freed espintcp ctx or sk. The following is a simple race scenario: cpu0 cpu1 espintcp_close()     cancel_work_sync(&ctx->work); espintcp_write_space() schedule_work(&ctx->work); To prevent this race     condition, cancel_work_sync() is replaced with disable_work_sync(). (CVE-2026-23239)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301785">https://www.tenable.com/plugins/nessus/301785</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox < 148.0.2]]></title>
            <link>https://www.tenable.com/plugins/nessus/301761</link>
            <guid>https://www.tenable.com/plugins/nessus/301761</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301761 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote macOS or Mac OS X host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Firefox installed on the remote macOS or Mac OS X host is prior to 148.0.2. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2026-19 advisory.<br /></span><span><br /></span><span>  - Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and     we presume that with enough effort some of these could have been exploited to run arbitrary code.<br /></span><span>    (CVE-2026-3847)<br /></span><span><br /></span><span>  - Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability     affects Firefox < 148.0.2. (CVE-2026-3845)<br /></span><span><br /></span><span>  - Same-origin policy bypass in the CSS Parsing and Computation component. This vulnerability affects Firefox     < 148.0.2. (CVE-2026-3846)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Mozilla Firefox version 148.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301761">https://www.tenable.com/plugins/nessus/301761</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Mozilla Firefox < 148.0.2]]></title>
            <link>https://www.tenable.com/plugins/nessus/301760</link>
            <guid>https://www.tenable.com/plugins/nessus/301760</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301760 with High Severity</p>
      <h3>Synopsis</h3>
      <span>A web browser installed on the remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Firefox installed on the remote Windows host is prior to 148.0.2. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2026-19 advisory.<br /></span><span><br /></span><span>  - Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and     we presume that with enough effort some of these could have been exploited to run arbitrary code.<br /></span><span>    (CVE-2026-3847)<br /></span><span><br /></span><span>  - Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability     affects Firefox < 148.0.2. (CVE-2026-3845)<br /></span><span><br /></span><span>  - Same-origin policy bypass in the CSS Parsing and Computation component. This vulnerability affects Firefox     < 148.0.2. (CVE-2026-3846)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Mozilla Firefox version 148.0.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301760">https://www.tenable.com/plugins/nessus/301760</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2026-28688]]></title>
            <link>https://www.tenable.com/plugins/nessus/301749</link>
            <guid>https://www.tenable.com/plugins/nessus/301749</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301749 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to     versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a     cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has     been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41. (CVE-2026-28688)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301749">https://www.tenable.com/plugins/nessus/301749</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet FortiAnalyzer Privilege escalation using undocumented CLI command (FG-IR-26-081)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301727</link>
            <guid>https://www.tenable.com/plugins/nessus/301727</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301727 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Fortinet Firewall is affected by a privilege escalation.<br /></span>
      <h3>Description</h3>
      <span>The version of FortiAnalyzer installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the FG-IR-26-081 advisory.<br /></span><span><br /></span><span>  - A hidden functionality vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0     through 7.4.7, FortiAnalyzer 7.2.0 through 7.2.10, FortiAnalyzer 7.0.0 through 7.0.14, FortiAnalyzer 6.4     all versions, FortiAnalyzer Cloud 7.6.2, FortiAnalyzer Cloud 7.4.1 through 7.4.7, FortiAnalyzer Cloud     7.2.1 through 7.2.10, FortiAnalyzer Cloud 7.0.1 through 7.0.14, FortiAnalyzer Cloud 6.4 all versions,     FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.0 through 7.2.10,     FortiManager 7.0.0 through 7.0.14, FortiManager 6.4 all versions, FortiManager Cloud 7.6.2 through 7.6.3,     FortiManager Cloud 7.4.1 through 7.4.7, FortiManager Cloud 7.2.1 through 7.2.10, FortiManager Cloud 7.0.1     through 7.0.14, FortiManager Cloud 6.4 all versions may allow a remote authenticated read-only admin with     CLI access to escalate their privilege via use of a hidden command. (CVE-2025-48418)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>For 6.4.x, see vendor advisory. For 7.0.x, upgrade to FortiAnalyzer version 7.0.15 or later. For 7.2.x, upgrade to FortiAnalyzer version 7.2.11 or later. For 7.4.x, upgrade to FortiAnalyzer version 7.4.8 or later. For 7.6.x, upgrade to FortiAnalyzer version 7.6.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301727">https://www.tenable.com/plugins/nessus/301727</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet FortiManager Privilege escalation using undocumented CLI command (FG-IR-26-081)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301726</link>
            <guid>https://www.tenable.com/plugins/nessus/301726</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301726 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Fortinet Firewall is affected by a privilege escalation.<br /></span>
      <h3>Description</h3>
      <span>The version of FortiManager installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the FG-IR-26-081 advisory.<br /></span><span><br /></span><span>  - A hidden functionality vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.3, FortiAnalyzer 7.4.0     through 7.4.7, FortiAnalyzer 7.2.0 through 7.2.10, FortiAnalyzer 7.0.0 through 7.0.14, FortiAnalyzer 6.4     all versions, FortiAnalyzer Cloud 7.6.2, FortiAnalyzer Cloud 7.4.1 through 7.4.7, FortiAnalyzer Cloud     7.2.1 through 7.2.10, FortiAnalyzer Cloud 7.0.1 through 7.0.14, FortiAnalyzer Cloud 6.4 all versions,     FortiManager 7.6.0 through 7.6.3, FortiManager 7.4.0 through 7.4.7, FortiManager 7.2.0 through 7.2.10,     FortiManager 7.0.0 through 7.0.14, FortiManager 6.4 all versions, FortiManager Cloud 7.6.2 through 7.6.3,     FortiManager Cloud 7.4.1 through 7.4.7, FortiManager Cloud 7.2.1 through 7.2.10, FortiManager Cloud 7.0.1     through 7.0.14, FortiManager Cloud 6.4 all versions may allow a remote authenticated read-only admin with     CLI access to escalate their privilege via use of a hidden command. (CVE-2025-48418)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>For 6.4.x, see vendor advisory. For 7.0.x, upgrade to FortiManager version 7.0.15 or later. For 7.2.x, upgrade to FortiManager version 7.2.11 or later. For 7.4.x, upgrade to FortiManager version 7.4.8 or later. For 7.6.x, upgrade to FortiManager version 7.6.4 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301726">https://www.tenable.com/plugins/nessus/301726</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet FortiAnalyzer sqli (FG-IR-26-095)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301723</link>
            <guid>https://www.tenable.com/plugins/nessus/301723</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301723 with High Severity</p>
      <h3>Synopsis</h3>
      <span>Remote host is affected by a sqli vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of FortiAnalyzer installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the FG-IR-26-095 advisory.<br /></span><span><br /></span><span>  - An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in     Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4.0 through 7.4.7, FortiAnalyzer 7.2 all     versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer-BigData 7.6.0,     FortiAnalyzer-BigData 7.4.0 through 7.4.4, FortiAnalyzer-BigData 7.2 all versions, FortiAnalyzer-BigData     7.0 all versions, FortiAnalyzer-BigData 6.4 all versions, FortiAnalyzer-BigData 6.2 all versions may allow     an authenticated attacker to execute unauthorized code or commands via specifically crafted requests.<br /></span><span>    (CVE-2025-49784)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>For 6.4.x / 7.0.x / 7.2.x, see vendor advisory. For 7.4.x, upgrade to FortiAnalyzer version 7.4.8 or later. For 7.6.x, upgrade to FortiAnalyzer version 7.6.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301723">https://www.tenable.com/plugins/nessus/301723</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Illustrator < 29.8.5 / 30.0 < 30.2 Multiple Vulnerabilities (APSB26-18)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301722</link>
            <guid>https://www.tenable.com/plugins/nessus/301722</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301722 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Adobe Illustrator instance installed on the remote host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Illustrator installed on the remote Windows host is prior to 29.8.5, 30.2. It is, therefore, affected by multiple vulnerabilities as referenced in the APSB26-18 advisory.<br /></span><span><br /></span><span>  - Illustrator versions 29.8.4, 30.1 and earlier are affected by an out-of-bounds write vulnerability that     could result in arbitrary code execution in the context of the current user. Exploitation of this issue     requires user interaction in that a victim must open a malicious file. (CVE-2026-21362, CVE-2026-27272)<br /></span><span><br /></span><span>  - Illustrator versions 29.8.4, 30.1 and earlier are affected by an Untrusted Search Path vulnerability that     might allow attackers to execute arbitrary code in the context of the current user. Exploitation of this     issue requires user interaction in that a victim must open a malicious file. (CVE-2026-21333)<br /></span><span><br /></span><span>  - Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability     that could result in arbitrary code execution in the context of the current user. Exploitation of this     issue requires user interaction in that a victim must open a malicious file. (CVE-2026-27271)<br /></span><span><br /></span><span>  - Illustrator versions 29.8.4, 30.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability     that could result in arbitrary code execution in the context of the current user. Exploitation of this     issue requires user interaction in that a victim must open a malicious file. (CVE-2026-27267)<br /></span><span><br /></span><span>  - Illustrator versions 29.8.4, 30.1 and earlier are affected by an Out-of-bounds Read vulnerability that     could lead to memory exposure. An attacker could leverage this vulnerability to access sensitive     information stored in memory. Exploitation of this issue requires user interaction in that a victim must     open a malicious file. (CVE-2026-27268, CVE-2026-27270)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Illustrator version 29.8.5, 30.2 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301722">https://www.tenable.com/plugins/nessus/301722</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet FortiManager Lack of TLS Certificate Validation during initial SSO Authentication (FG-IR-26-078)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301718</link>
            <guid>https://www.tenable.com/plugins/nessus/301718</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301718 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Fortinet Firewall is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FortiManager installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the FG-IR-26-078 advisory.<br /></span><span><br /></span><span>  - A improper certificate validation vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4,     FortiAnalyzer 7.4.0 through 7.4.8, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions,     FortiAnalyzer 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.8,     FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions may allow a     remote unauthenticated attacker to view confidential information via a man in the middle [MiTM] attack.<br /></span><span>    (CVE-2025-68482)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>For 6.4.x / 7.0.x / 7.2.x, see vendor advisory. For 7.4.x, upgrade to FortiManager version 7.4.9 or later. For 7.6.x, upgrade to FortiManager version 7.6.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301718">https://www.tenable.com/plugins/nessus/301718</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Fortinet FortiAnalyzer Lack of TLS Certificate Validation during initial SSO Authentication (FG-IR-26-078)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301717</link>
            <guid>https://www.tenable.com/plugins/nessus/301717</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301717 with Medium Severity</p>
      <h3>Synopsis</h3>
      <span>Fortinet Firewall is missing one or more security-related updates.<br /></span>
      <h3>Description</h3>
      <span>The version of FortiAnalyzer installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the FG-IR-26-078 advisory.<br /></span><span><br /></span><span>  - A improper certificate validation vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4,     FortiAnalyzer 7.4.0 through 7.4.8, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions,     FortiAnalyzer 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4.0 through 7.4.8,     FortiManager 7.2 all versions, FortiManager 7.0 all versions, FortiManager 6.4 all versions may allow a     remote unauthenticated attacker to view confidential information via a man in the middle [MiTM] attack.<br /></span><span>    (CVE-2025-68482)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>For 6.4.x / 7.0.x / 7.2.x, see vendor advisory. For 7.4.x, upgrade to FortiAnalyzer version 7.4.9 or later. For 7.6.x, upgrade to FortiAnalyzer version 7.6.5 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301717">https://www.tenable.com/plugins/nessus/301717</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Premiere Pro < 25.6 Arbitrary code execution (APSB26-28) (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301714</link>
            <guid>https://www.tenable.com/plugins/nessus/301714</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301714 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Adobe Premiere Pro instance installed on the remote host is affected by an arbitrary code execution vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Premiere Pro installed on the remote macOS host is prior to 25.6. It is, therefore, affected by a vulnerability as referenced in the APSB26-28 advisory.<br /></span><span><br /></span><span>  - Out-of-bounds Read (CWE-125) potentially leading to Arbitrary code execution (CVE-2026-27269)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Premiere Pro version 25.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301714">https://www.tenable.com/plugins/nessus/301714</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Premiere Pro < 25.6 Arbitrary code execution (APSB26-28)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301713</link>
            <guid>https://www.tenable.com/plugins/nessus/301713</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301713 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Adobe Premiere Pro instance installed on the remote host is affected by an arbitrary code execution vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Premiere Pro installed on the remote Windows host is prior to 25.6. It is, therefore, affected by a vulnerability as referenced in the APSB26-28 advisory.<br /></span><span><br /></span><span>  - Out-of-bounds Read (CWE-125) potentially leading to Arbitrary code execution (CVE-2026-27269)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Premiere Pro version 25.6 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301713">https://www.tenable.com/plugins/nessus/301713</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Acrobat < 24.001.30356 / 25.001.21288 Multiple Vulnerabilities (APSB26-26) (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301712</link>
            <guid>https://www.tenable.com/plugins/nessus/301712</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301712 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Adobe Acrobat installed on the remote macOS host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Acrobat installed on the remote macOS host is a version prior to 24.001.30356 or 25.001.21288. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After     Free vulnerability that could result in arbitrary code execution in the context of the current user.<br /></span><span>    Exploitation of this issue requires user interaction in that a victim must open a malicious file.<br /></span><span>    (CVE-2026-27220, CVE-2026-27278)<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by an Improper     Certificate Validation vulnerability that could result in a Security feature bypass. An attacker could     leverage this vulnerability to spoof the identity of a signer. Exploitation of this issue requires user     interaction. (CVE-2026-27221)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Acrobat version 24.001.30356 / 25.001.21288 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301712">https://www.tenable.com/plugins/nessus/301712</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Reader < 25.001.21288 Multiple Vulnerabilities (APSB26-26) (macOS)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301711</link>
            <guid>https://www.tenable.com/plugins/nessus/301711</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301711 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Adobe Reader installed on the remote macOS host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Reader installed on the remote macOS host is a version prior to 25.001.21288. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After     Free vulnerability that could result in arbitrary code execution in the context of the current user.<br /></span><span>    Exploitation of this issue requires user interaction in that a victim must open a malicious file.<br /></span><span>    (CVE-2026-27220, CVE-2026-27278)<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by an Improper     Certificate Validation vulnerability that could result in a Security feature bypass. An attacker could     leverage this vulnerability to spoof the identity of a signer. Exploitation of this issue requires user     interaction. (CVE-2026-27221)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Reader version 25.001.21288 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301711">https://www.tenable.com/plugins/nessus/301711</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Acrobat < 24.001.30356 / 25.001.21288 Multiple Vulnerabilities (APSB26-26)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301710</link>
            <guid>https://www.tenable.com/plugins/nessus/301710</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301710 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Adobe Acrobat installed on the remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Acrobat installed on the remote Windows host is a version prior to 24.001.30356 or 25.001.21288. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After     Free vulnerability that could result in arbitrary code execution in the context of the current user.<br /></span><span>    Exploitation of this issue requires user interaction in that a victim must open a malicious file.<br /></span><span>    (CVE-2026-27220, CVE-2026-27278)<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by an Improper     Certificate Validation vulnerability that could result in a Security feature bypass. An attacker could     leverage this vulnerability to spoof the identity of a signer. Exploitation of this issue requires user     interaction. (CVE-2026-27221)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Acrobat version 24.001.30356 / 25.001.21288 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301710">https://www.tenable.com/plugins/nessus/301710</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Adobe Reader < 25.001.21288 Multiple Vulnerabilities (APSB26-26)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301709</link>
            <guid>https://www.tenable.com/plugins/nessus/301709</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301709 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The version of Adobe Reader installed on the remote Windows host is affected by multiple vulnerabilities.<br /></span>
      <h3>Description</h3>
      <span>The version of Adobe Reader installed on the remote Windows host is a version prior to 25.001.21288. It is, therefore, affected by multiple vulnerabilities.<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by a Use After     Free vulnerability that could result in arbitrary code execution in the context of the current user.<br /></span><span>    Exploitation of this issue requires user interaction in that a victim must open a malicious file.<br /></span><span>    (CVE-2026-27220, CVE-2026-27278)<br /></span><span><br /></span><span>  - Acrobat Reader versions 24.001.30307, 24.001.30308, 25.001.21265 and earlier are affected by an Improper     Certificate Validation vulnerability that could result in a Security feature bypass. An attacker could     leverage this vulnerability to spoof the identity of a signer. Exploitation of this issue requires user     interaction. (CVE-2026-27221)<br /></span><span><br /></span><span>Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Adobe Reader version 25.001.21288 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301709">https://www.tenable.com/plugins/nessus/301709</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Linux Distros Unpatched Vulnerability : CVE-2025-13350]]></title>
            <link>https://www.tenable.com/plugins/nessus/301707</link>
            <guid>https://www.tenable.com/plugins/nessus/301707</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301707 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.<br /></span>
      <h3>Description</h3>
      <span>The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.<br /></span><span><br /></span><span>  - Ubuntu Linux 6.8 GA retains the legacy AF_UNIX garbage collector but backports upstream commit     8594d9b85c07 (af_unix: Don't call skb_get() for OOB skb). When orphaned MSG_OOB sockets hit unix_gc(),     the garbage collector still calls kfree_skb() as if OOB SKBs held two references; on Ubuntu Linux 6.8     (Noble Numbat) kernel tree, they have only the queue reference, so the buffer is freed while still     reachable and subsequent queue walks dereference freed memory, yielding a reliable local privilege     escalation (LPE) caused by a use-after-free (UAF). Ubuntu builds that have already taken the new GC stack     from commit 4090fa373f0e, and mainline Linux kernels shipping that infrastructure are unaffected because     they no longer execute the legacy collector path. This issue affects Ubuntu Linux from 6.8.0-56.58 before     6.8.0-84.84. (CVE-2025-13350)<br /></span><span><br /></span><span>Note that Nessus relies on the presence of the package as reported by the vendor.<br /></span>
      <h3>Solution</h3>
      <span>There is no known solution at this time.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301707">https://www.tenable.com/plugins/nessus/301707</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zoom Workplace < 6.6.11 Vulnerability (ZSB-26002)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301701</link>
            <guid>https://www.tenable.com/plugins/nessus/301701</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301701 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an application installed that is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Zoom Workplace installed on the remote host is prior to 6.6.11. It is, therefore, affected by a vulnerability as referenced in the ZSB-26002 advisory.<br /></span><span><br /></span><span>  - Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an     authenticated user to conduct an escalation of privilege via local access. Users can help keep themselves     secure by applying the latest updates available at https://zoom.us/download. (CVE-2026-30900)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zoom Client for Meetings 6.6.11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301701">https://www.tenable.com/plugins/nessus/301701</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zoom Workplace VDI Client 6.6 < 6.6.11 Vulnerability (ZSB-26002)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301700</link>
            <guid>https://www.tenable.com/plugins/nessus/301700</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301700 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an application installed that is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Zoom Workplace VDI Client installed on the remote host is between 6.6 and 6.6.11. It is, therefore, affected by a vulnerability as referenced in the ZSB-26002 advisory.<br /></span><span><br /></span><span>  - Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an     authenticated user to conduct an escalation of privilege via local access. Users can help keep themselves     secure by applying the latest updates available at https://zoom.us/download. (CVE-2026-30900)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zoom VDI Meeting Client 6.6.11 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301700">https://www.tenable.com/plugins/nessus/301700</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zoom Workplace < 6.6.0 Vulnerability (ZSB-26004)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301681</link>
            <guid>https://www.tenable.com/plugins/nessus/301681</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301681 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an application installed that is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Zoom Workplace installed on the remote host is prior to 6.6.0. It is, therefore, affected by a vulnerability as referenced in the ZSB-26004 advisory.<br /></span><span><br /></span><span>  - Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to     conduct an escalation of privilege via local access. Users can help keep themselves secure by applying the     latest updates available at https://zoom.us/download. (CVE-2026-30902)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zoom Client for Meetings 6.6.0 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301681">https://www.tenable.com/plugins/nessus/301681</a></p>
    ]]></description>
        </item>
        <item>
            <title><![CDATA[Zoom Workplace VDI Client < 6.4.15 Vulnerability (ZSB-26004)]]></title>
            <link>https://www.tenable.com/plugins/nessus/301680</link>
            <guid>https://www.tenable.com/plugins/nessus/301680</guid>
            <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[
      <p>Nessus Plugin ID 301680 with High Severity</p>
      <h3>Synopsis</h3>
      <span>The remote host has an application installed that is affected by a vulnerability.<br /></span>
      <h3>Description</h3>
      <span>The version of Zoom Workplace VDI Client installed on the remote host is prior to 6.4.15. It is, therefore, affected by a vulnerability as referenced in the ZSB-26004 advisory.<br /></span><span><br /></span><span>  - Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to     conduct an escalation of privilege via local access. Users can help keep themselves secure by applying the     latest updates available at https://zoom.us/download. (CVE-2026-30902)<br /></span><span><br /></span><span>Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.<br /></span>
      <h3>Solution</h3>
      <span>Upgrade to Zoom VDI Meeting Client 6.4.15 or later.<br /></span>

      <p>Read more at  <a href="https://www.tenable.com/plugins/nessus/301680">https://www.tenable.com/plugins/nessus/301680</a></p>
    ]]></description>
        </item>
    </channel>
</rss>