Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Neuvector_vulnerability_scanner
(Jenkins)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-11-29 | CVE-2023-49673 | A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password. | Google_compute_engine, Jira, Matlab, Neuvector_vulnerability_scanner | 8.8 | ||
2023-11-29 | CVE-2023-49674 | A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password. | Neuvector_vulnerability_scanner | 4.3 | ||
2022-10-19 | CVE-2022-43434 | Jenkins NeuVector Vulnerability Scanner Plugin 1.20 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download. | Neuvector_vulnerability_scanner | 5.3 | ||
2019-09-25 | CVE-2019-10430 | Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | Neuvector_vulnerability_scanner | 5.5 | ||
2023-04-12 | CVE-2023-30517 | Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server. | Neuvector_vulnerability_scanner | 5.3 |