Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2023-32188
Disclosure Date: October 16, 2024 (last updated October 16, 2024)
A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. This can lead to an RCE.
0
Attacker Value
Unknown
CVE-2023-49674
Disclosure Date: November 29, 2023 (last updated December 06, 2023)
A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.
0
Attacker Value
Unknown
CVE-2023-49673
Disclosure Date: November 29, 2023 (last updated December 06, 2023)
A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.
0
Attacker Value
Unknown
CVE-2023-30517
Disclosure Date: April 12, 2023 (last updated October 08, 2023)
Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server.
0
Attacker Value
Unknown
CVE-2022-43434
Disclosure Date: October 19, 2022 (last updated October 25, 2023)
Jenkins NeuVector Vulnerability Scanner Plugin 1.20 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.
0
Attacker Value
Unknown
CVE-2019-10430
Disclosure Date: September 25, 2019 (last updated October 26, 2023)
Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
0
Attacker Value
Unknown
CVE-2019-19747
Disclosure Date: August 21, 2019 (last updated November 27, 2024)
NeuVector 3.1 when configured to allow authentication via Active Directory, does not enforce non-empty passwords which allows an attacker with access to the Neuvector portal to authenticate as any valid LDAP user by providing a valid username and an empty password (provided that the active directory server has not been configured to reject empty passwords).
0