Show filters
41 Total Results
Displaying 11-20 of 41
Sort by:
Attacker Value
Unknown
CVE-2023-2484
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
The Active Directory Integration plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 4.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
0
Attacker Value
Unknown
CVE-2023-0812
Disclosure Date: May 15, 2023 (last updated October 08, 2023)
The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.1 does not have proper authorization or nonce values for some POST requests, leading to unauthenticated data disclosure.
0
Attacker Value
Unknown
CVE-2023-23749
Disclosure Date: January 17, 2023 (last updated October 08, 2023)
The 'LDAP Integration with Active Directory and OpenLDAP - NTLM & Kerberos Login' extension is vulnerable to LDAP Injection since is not properly sanitizing the 'username' POST parameter. An attacker can manipulate this paramter to dump arbitrary contents form the LDAP Database.
0
Attacker Value
Unknown
CVE-2022-2987
Disclosure Date: September 26, 2022 (last updated February 24, 2025)
The Ldap WP Login / Active Directory Integration WordPress plugin before 3.0.2 does not have any authorisation and CSRF checks when updating it's settings (which are hooked to the init action), allowing unauthenticated attackers to update them. Attackers could set their own LDAP server to be used to authenticated users, therefore bypassing the current authentication
0
Attacker Value
Unknown
CVE-2022-1697
Disclosure Date: September 06, 2022 (last updated February 24, 2025)
Okta Active Directory Agent versions 3.8.0 through 3.11.0 installed the Okta AD Agent Update Service using an unquoted path. Note: To remediate this vulnerability, you must uninstall Okta Active Directory Agent and reinstall Okta Active Directory Agent 3.12.0 or greater per the documentation.
0
Attacker Value
Unknown
CVE-2022-23105
Disclosure Date: January 12, 2022 (last updated February 23, 2025)
Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations.
0
Attacker Value
Unknown
CVE-2021-42306
Disclosure Date: November 24, 2021 (last updated February 23, 2025)
An information disclosure vulnerability manifests when a user or an application uploads unprotected private key data as part of an authentication certificate keyCredential on an Azure AD Application or Service Principal (which is not recommended). This vulnerability allows a user or service in the tenant with application read access to read the private key data that was added to the application.
Azure AD addressed this vulnerability by preventing disclosure of any private key values added to the application.
Microsoft has identified services that could manifest this vulnerability, and steps that customers should take to be protected. Refer to the FAQ section for more information.
For more details on this issue, please refer to the MSRC Blog Entry.
0
Attacker Value
Unknown
CVE-2021-36949
Disclosure Date: August 12, 2021 (last updated February 23, 2025)
Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability
0
Attacker Value
Unknown
CVE-2020-2300
Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.
0
Attacker Value
Unknown
CVE-2020-2301
Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
0