Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2023-32188

Disclosure Date: October 16, 2024 (last updated October 16, 2024)
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
0
Attacker Value
Unknown

CVE-2023-49674

Disclosure Date: November 29, 2023 (last updated December 06, 2023)
A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.
Attacker Value
Unknown

CVE-2023-49673

Disclosure Date: November 29, 2023 (last updated December 06, 2023)
A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.
Attacker Value
Unknown

CVE-2023-30517

Disclosure Date: April 12, 2023 (last updated October 08, 2023)
Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server.
Attacker Value
Unknown

CVE-2022-43434

Disclosure Date: October 19, 2022 (last updated October 25, 2023)
Jenkins NeuVector Vulnerability Scanner Plugin 1.20 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.
Attacker Value
Unknown

CVE-2019-10430

Disclosure Date: September 25, 2019 (last updated October 26, 2023)
Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
Attacker Value
Unknown

CVE-2019-19747

Disclosure Date: August 21, 2019 (last updated November 27, 2024)
NeuVector 3.1 when configured to allow authentication via Active Directory, does not enforce non-empty passwords which allows an attacker with access to the Neuvector portal to authenticate as any valid LDAP user by providing a valid username and an empty password (provided that the active directory server has not been configured to reject empty passwords).