Skip to content

Commit 46bc171

Browse files
committed
updating date cve
Signed-off-by: Sunil Singh <[email protected]>
1 parent 4159200 commit 46bc171

File tree

1 file changed

+1
-1
lines changed
  • versioned_docs/version-5.4/16.security_advisories/01.security_advisories

1 file changed

+1
-1
lines changed

versioned_docs/version-5.4/16.security_advisories/01.security_advisories/cve.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ NeuVector is committed to informing the community of security issues. Below is a
1212
| [CVE-2025-46808](https://github.com/neuvector/manager/security/advisories/GHSA-fggw-hv56-8m6r) | Sensitive information may be logged in the manager container depending on logging configuration and credential permissions. For more information, refer to [Sensitive information exposure in NeuVector manager container logs](#sensitive-information-exposure-in-neuvector-manager-container-logs). | 09 Jul 2025 | [NeuVector v5.4.5](https://github.com/neuvector/neuvector/releases/tag/v5.4.5) |
1313
| [CVE-2024-38095](https://www.suse.com/security/cve/CVE-2024-38095.html) | In .NET, a malicious X.509 certificate or certificate chain can cause excessive CPU consumption, resulting in denial of service. This CVE was flagged as an affected .NET library detection issue. | 9 Jul 2024 | [NeuVector v5.4.5](https://github.com/neuvector/neuvector/releases/tag/v5.4.5) |
1414
| [CVE-2024-7347](https://www.suse.com/security/cve/CVE-2024-7347.html) | The NGINX `ngx_http_mp4_module` vulnerability allows crafted MP4 files to cause memory over-reads and worker process termination. This CVE was reported in NeuVector 5.4.2 as a possible **false negative** detection in the vulnerability scanner. The issue was related to detection accuracy and not to the NeuVector product itself. | 14 Aug 2024 | [NeuVector v5.4.2](https://github.com/neuvector/neuvector/releases/tag/v5.4.2) |
15-
| [CVE-2018-20796](https://www.suse.com/security/cve/CVE-2018-20796.html) | In the GNU C Library through 2.29, check_dst_limits_calc_pos_1 in `posix/regexec.c` has Uncontrolled Recursion. | 26 Feb 2019 | Not applicable, flagged in [v5.4.2](https://github.com/neuvector/neuvector/releases/tag/v5.4.2) as a **false positive**. |
15+
| [CVE-2018-20796](https://www.suse.com/security/cve/CVE-2018-20796.html) | In the GNU C Library through 2.29, check_dst_limits_calc_pos_1 in `posix/regexec.c` has Uncontrolled Recursion. | 15 Jan 2025 | Not applicable, flagged in [v5.4.2](https://github.com/neuvector/neuvector/releases/tag/v5.4.2) as a **false positive**. |
1616
| [CVE-2024-41110](https://github.com/advisories/GHSA-v23v-6jw2-98fq) | A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass [authorization plugins (AuthZ)](https://docs.docker.com/engine/extend/plugins_authorization/) under specific circumstances. The base likelihood of this being exploited is low. | 16 Nov 2024 | [NeuVector v5.4.1](https://github.com/neuvector/neuvector/releases/tag/v5.4.1) |
1717
| [CVE-2020-26160](https://github.com/advisories/GHSA-w73w-5m7g-f7qc) | `jwt-go` allows attackers to bypass intended access restrictions in situations with `[]string{}` for `m["aud"]` (which is allowed by the specification). Because the type assertion fails, "" is the value of `aud`. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of `jwt-go` are advised to migrate to [`golang-jwt`](https://github.com/golang-jwt/jwt) at version 3.2.1. | 16 Nov 2024 | [NeuVector v5.4.1](https://github.com/neuvector/neuvector/releases/tag/v5.4.1) |
1818

0 commit comments

Comments
 (0)