Tenable Vulnerabilities
Comprehensive security vulnerability database for Tenable products
2
0
2
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-2698 | 5.7 | This vulnerability allows an authenticated user to access parts of the system they shouldn't be able to reach, potentially exposing sensitive information or functions. It requires that the user is already logged in, but their permissions are not properly enforced, leading to unauthorized access. | tenablesecurity center | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2697 | 5.3 | An attacker with an account on the Security Center can exploit a flaw to gain higher privileges by manipulating the 'owner' parameter. This means they could potentially access or control parts of the system that they shouldn't, but they must already be logged in to take advantage of this vulnerability. | tenablesecurity center | Exploit Available | about 1 month agoFeb 23, 2026 |
About Tenable Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Tenable products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.