You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/16.security_advisories/01.security_advisories/cve.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ NeuVector is committed to informing the community of security issues. Below is a
4
4
5
5
## CVE List
6
6
7
-
| ID | Description | Date |Release|
7
+
| ID | Description | Date |Resolution|
8
8
| :---- | :---- | :---- | :---- |
9
9
|[CVE-2025-8077](https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56)| For NeuVector deployment on the Kubernetes-based environment, the bootstrap password of the default admin user will be generated randomly and stored in a Kubernetes secret. The default admin will need to get the bootstrap password from the Kubernetes secret first and will be asked to change password after the first UI login is successful. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
10
10
|[CVE-2025-53884](https://github.com/neuvector/neuvector/security/advisories/GHSA-8ff6-pc43-jwv3)| NeuVector uses a cryptographically secure salt with the PBKDF2 algorithm instead of a simple hash to protect user passwords. For rolling upgrades from earlier versions, NeuVector recalculates and stores the new password hash only after each user’s next successful login. | 25 Aug 2025 |[NeuVector v5.4.6](https://github.com/neuvector/neuvector/releases/tag/v5.4.6)|
0 commit comments