cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-37943,https://securityvulnerability.io/vulnerability/CVE-2023-37943,Unencrypted Connection Issues in Jenkins Active Directory Plugin Affects Security,"The Jenkins Active Directory Plugin versions up to 2.30 have a critical security flaw where the 'Require TLS' and 'StartTLS' settings are ignored. This oversight results in the plugin always connecting to Active Directory using unencrypted connections. As a consequence, attackers can intercept network traffic between the Jenkins controller and Active Directory servers, putting sensitive user credentials at significant risk. It is imperative for users of affected versions to promptly apply any available updates to mitigate this exposure.",Jenkins,Jenkins Active Directory Plugin,5.9,MEDIUM,0.0018899999558925629,false,,false,false,false,,,false,false,,2023-07-12T16:15:00.000Z,0 CVE-2022-23105,https://securityvulnerability.io/vulnerability/CVE-2022-23105,Data Transmission Vulnerability in Jenkins Active Directory Plugin by CloudBees,"The Jenkins Active Directory Plugin versions 2.25 and earlier are impacted by a vulnerability that allows unencrypted transmission of data between the Jenkins controller and Active Directory servers. This lack of encryption can expose sensitive information during the communication process, putting user data at risk. It is essential for users of this plugin to take the necessary steps to mitigate this exposure by applying the latest security updates and configurations.",Jenkins,Jenkins Active Directory Plugin,6.5,MEDIUM,0.0007399999885819852,false,,false,false,false,,,false,false,,2022-01-12T19:06:02.000Z,0 CVE-2020-2303,https://securityvulnerability.io/vulnerability/CVE-2020-2303,,"A cross-site request forgery (CSRF) vulnerability in Jenkins Active Directory Plugin 2.19 and earlier allows attackers to perform connection tests, connecting to attacker-specified or previously configured Active Directory servers using attacker-specified credentials.",Jenkins,Jenkins Active Directory Plugin,4.3,MEDIUM,0.0005600000149570405,false,,false,false,false,,,false,false,,2020-11-04T14:35:38.000Z,0 CVE-2020-2302,https://securityvulnerability.io/vulnerability/CVE-2020-2302,,A missing permission check in Jenkins Active Directory Plugin 2.19 and earlier allows attackers with Overall/Read permission to access the domain health check diagnostic page.,Jenkins,Jenkins Active Directory Plugin,4.3,MEDIUM,0.000539999979082495,false,,false,false,false,,,false,false,,2020-11-04T14:35:37.000Z,0 CVE-2020-2301,https://securityvulnerability.io/vulnerability/CVE-2020-2301,,Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user with any password while a successful authentication of that user is still in the optional cache when using Windows/ADSI mode.,Jenkins,Jenkins Active Directory Plugin,9.8,CRITICAL,0.002219999907538295,false,,false,false,false,,,false,false,,2020-11-04T14:35:37.000Z,0 CVE-2020-2299,https://securityvulnerability.io/vulnerability/CVE-2020-2299,,Jenkins Active Directory Plugin 2.19 and earlier allows attackers to log in as any user if a magic constant is used as the password.,Jenkins,Jenkins Active Directory Plugin,9.8,CRITICAL,0.0021100000012665987,false,,false,false,false,,,false,false,,2020-11-04T14:35:36.000Z,0 CVE-2020-2300,https://securityvulnerability.io/vulnerability/CVE-2020-2300,,"Jenkins Active Directory Plugin 2.19 and earlier does not prohibit the use of an empty password in Windows/ADSI mode, which allows attackers to log in to Jenkins as any user depending on the configuration of the Active Directory server.",Jenkins,Jenkins Active Directory Plugin,9.8,CRITICAL,0.0021100000012665987,false,,false,false,false,,,false,false,,2020-11-04T14:35:36.000Z,0 CVE-2019-1003009,https://securityvulnerability.io/vulnerability/CVE-2019-1003009,,"An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS.",Jenkins,Jenkins Active Directory Plugin,7.4,HIGH,0.0011399999493733048,false,,false,false,false,,,false,false,,2019-02-06T16:29:00.000Z,0 CVE-2017-2649,https://securityvulnerability.io/vulnerability/CVE-2017-2649,,"It was found that the Active Directory Plugin for Jenkins up to and including version 2.2 did not verify certificates of the Active Directory server, thereby enabling Man-in-the-Middle attacks.",Jenkins,Active Directory Jenkins Plugin,8.1,HIGH,0.0012199999764561653,false,,false,false,false,,,false,false,,2018-07-27T20:29:00.000Z,0