Jenkins Benchmark Evaluator
By the Year
In 2023 there have been 2 vulnerabilities in Jenkins Benchmark Evaluator with an average score of 7.1 out of ten. Benchmark Evaluator did not have any published security vulnerabilities last year. That is, 2 more vulnerabilities have already been reported in 2023 as compared to last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 2 | 7.10 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Benchmark Evaluator vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Benchmark Evaluator Security Vulnerabilities
A cross-site request forgery (CSRF) vulnerability in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier
CVE-2023-37962
8.8 - High
- July 12, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.
Session Riding
A missing permission check in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier
CVE-2023-37963
5.4 - Medium
- July 12, 2023
A missing permission check in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.
AuthZ
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Benchmark Evaluator or by Jenkins? Click the Watch button to subscribe.
