296,746
Total vulnerabilities in the database
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.
| Software | From | Fixed in |
|---|---|---|
| jenkins / jenkins | - | 1.642.1.x |
| redhat / openshift | 3.1 | 3.1.x |
| jenkins / jenkins | - | 1.649.x |
org.jenkins-ci.main / jenkins-core
|
- | 1.650 |