cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-49674,https://securityvulnerability.io/vulnerability/CVE-2023-49674,,A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.,Jenkins,Jenkins NeuVector Vulnerability Scanner Plugin,4.3,MEDIUM,0.001509999972768128,false,false,false,false,,false,false,2023-11-29T14:15:00.000Z,0 CVE-2023-49673,https://securityvulnerability.io/vulnerability/CVE-2023-49673,CSRF Vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin,"A cross-site request forgery vulnerability exists in the Jenkins NeuVector Vulnerability Scanner Plugin, which may allow attackers to manipulate the application by sending unauthorized commands. An attacker can exploit this vulnerability to connect to a specified hostname and port, using custom credentials provided by them. This type of attack can lead to significant security issues if not mitigated. Proper validation and implementation of security measures are crucial to safeguard against such vulnerabilities.",Jenkins,Jenkins Neuvector Vulnerability Scanner Plugin,8.8,HIGH,0.0006600000197067857,false,false,false,false,,false,false,2023-11-29T14:15:00.000Z,0 CVE-2023-30517,https://securityvulnerability.io/vulnerability/CVE-2023-30517,,Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier unconditionally disables SSL/TLS certificate and hostname validation when connecting to a configured NeuVector Vulnerability Scanner server.,Jenkins,Jenkins NeuVector Vulnerability Scanner Plugin,5.3,MEDIUM,0.0005600000149570405,false,false,false,false,,false,false,2023-04-12T18:15:00.000Z,0 CVE-2022-43434,https://securityvulnerability.io/vulnerability/CVE-2022-43434,,"Jenkins NeuVector Vulnerability Scanner Plugin 1.20 and earlier programmatically disables Content-Security-Policy protection for user-generated content in workspaces, archived artifacts, etc. that Jenkins offers for download.",Jenkins,Jenkins Neuvector Vulnerability Scanner Plugin,5.3,MEDIUM,0.0006099999882280827,false,false,false,false,,false,false,2022-10-19T00:00:00.000Z,0 CVE-2019-10430,https://securityvulnerability.io/vulnerability/CVE-2019-10430,,Jenkins NeuVector Vulnerability Scanner Plugin 1.5 and earlier stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.,Jenkins,Jenkins Neuvector Vulnerability Scanner Plugin,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2019-09-25T15:05:34.000Z,0