Jenkins Lightweight Directory Access Protocol
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Jenkins Lightweight Directory Access Protocol.
By the Year
In 2025 there have been 0 vulnerabilities in Jenkins Lightweight Directory Access Protocol. Lightweight Directory Access Protocol did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 1 | 4.30 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Lightweight Directory Access Protocol vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Lightweight Directory Access Protocol Security Vulnerabilities
A cross-site request forgery (CSRF) vulnerability in Jenkins LDAP Plugin
CVE-2023-32978
4.3 - Medium
- May 16, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins LDAP Plugin allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.
Session Riding
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Lightweight Directory Access Protocol or by Jenkins? Click the Watch button to subscribe.
