Jenkins Lightweight Directory Access Protocol
By the Year
In 2023 there have been 1 vulnerability in Jenkins Lightweight Directory Access Protocol with an average score of 4.3 out of ten. Lightweight Directory Access Protocol did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2023 as compared to last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 1 | 4.30 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Lightweight Directory Access Protocol vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Lightweight Directory Access Protocol Security Vulnerabilities
A cross-site request forgery (CSRF) vulnerability in Jenkins LDAP Plugin
CVE-2023-32978
4.3 - Medium
- May 16, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins LDAP Plugin allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.
Session Riding
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Lightweight Directory Access Protocol or by Jenkins? Click the Watch button to subscribe.
