Show filters
41 Total Results
Displaying 21-30 of 41
Sort by:
Attacker Value
Unknown

CVE-2020-2301

Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.
Attacker Value
Unknown

CVE-2020-2303

Disclosure Date: November 04, 2020 (last updated February 22, 2025)
A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials.
Attacker Value
Unknown

CVE-2020-2299

Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.
Attacker Value
Unknown

CVE-2019-1258

Disclosure Date: August 14, 2019 (last updated May 30, 2024)
An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens. This vulnerability allows an authenticated attacker to perform actions in context of another user. The authenticated attacker can exploit this vulneraiblity by accessing a service configured for On-Behalf-Of flow that assigns incorrect tokens. This security update addresses the vulnerability by removing fallback cache look-up for On-Behalf-Of scenarios.
0
Attacker Value
Unknown

CVE-2019-1000

Disclosure Date: May 16, 2019 (last updated November 27, 2024)
An elevation of privilege vulnerability exists in Microsoft Azure Active Directory Connect build 1.3.20.0, which allows an attacker to execute two PowerShell cmdlets in context of a privileged account, and perform privileged actions.To exploit this, an attacker would need to authenticate to the Azure AD Connect server, aka 'Microsoft Azure AD Connect Elevation of Privilege Vulnerability'.
0
Attacker Value
Unknown

CVE-2019-1003009

Disclosure Date: February 06, 2019 (last updated October 26, 2023)
An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS.
0
Attacker Value
Unknown

CVE-2018-16794

Disclosure Date: September 18, 2018 (last updated November 27, 2024)
Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation Services) has an SSRF vulnerability via the txtBoxEmail parameter in /adfs/ls.
0
Attacker Value
Unknown

CVE-2017-2649

Disclosure Date: July 27, 2018 (last updated November 27, 2024)
It was found that the Active Directory Plugin for Jenkins up to and including version 2.2 did not verify certificates of the Active Directory server, thereby enabling Man-in-the-Middle attacks.
0
Attacker Value
Unknown

CVE-2017-8613

Disclosure Date: June 29, 2017 (last updated November 26, 2024)
Azure AD Connect Password writeback, if misconfigured during enablement, allows an attacker to reset passwords and gain unauthorized access to arbitrary on-premises AD privileged user accounts aka "Azure AD Connect Elevation of Privilege Vulnerability."
0
Attacker Value
Unknown

CVE-2016-7191

Disclosure Date: September 28, 2016 (last updated November 25, 2024)
The Microsoft Azure Active Directory Passport (aka Passport-Azure-AD) library 1.x before 1.4.6 and 2.x before 2.0.1 for Node.js does not recognize the validateIssuer setting, which allows remote attackers to bypass authentication via a crafted token.
0