Metrics
Affected Vendors & Products
| Link | Providers |
|---|---|
| https://www.tenable.com/security/tns-2026-06 |
|
Tue, 17 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 17 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted. | |
| Title | [R1] Stand-alone Security Patches Available for Tenable Security Center versions 6.5.1, 6.6.0 and 6.7.2: SC-202602.1 + SC-202602.2 | |
| First Time appeared |
Tenable
Tenable security Center |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:a:tenable:security_center:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tenable
Tenable security Center |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published: 2026-02-17T18:19:38.416Z
Updated: 2026-02-17T19:39:57.069Z
Reserved: 2026-02-17T14:22:13.573Z
Link: CVE-2026-2630
Updated: 2026-02-17T18:57:43.108Z
Status : Received
Published: 2026-02-17T19:21:58.060
Modified: 2026-02-17T20:22:10.780
Link: CVE-2026-2630
No data.