{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T16:10:23.411","vulnerabilities":[{"cve":{"id":"CVE-2023-49673","sourceIdentifier":"jenkinsci-cert@googlegroups.com","published":"2023-11-29T14:15:07.707","lastModified":"2024-11-21T08:33:40.857","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password."},{"lang":"es","value":"Una vulnerabilidad de cross-site request forgery (CSRF) en Jenkins NeuVector Vulnerability Scanner Plugin 1.22 y versiones anteriores permite a los atacantes conectarse a un nombre de host y puerto especificados por el atacante utilizando un nombre de usuario y contraseña especificados por el atacante."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:neuvector_vulnerability_scanner:*:*:*:*:*:jenkins:*:*","versionEndExcluding":"2.2","matchCriteriaId":"6D2CFA20-4C85-40E9-B42E-E6C6C7996FC5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:jira:*:*:*:*:*:jenkins:*:*","versionEndExcluding":"3.1.2","matchCriteriaId":"6DBBA0D0-DB53-4A3E-B0DB-4514F45BE944"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:google_compute_engine:*:*:*:*:*:jenkins:*:*","versionEndExcluding":"4.551.0","matchCriteriaId":"4374C881-1548-41DF-B673-5F9E59B08C4C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jenkins:matlab:*:*:*:*:*:jenkins:*:*","versionEndExcluding":"2.11.1","matchCriteriaId":"E0BD6729-98FD-4D2D-842C-DD9F16139FDA"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/11/29/1","source":"jenkinsci-cert@googlegroups.com","tags":["Mailing List"]},{"url":"https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3256","source":"jenkinsci-cert@googlegroups.com","tags":["Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2023/11/29/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https://www.jenkins.io/security/advisory/2023-11-29/#SECURITY-3256","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}