Total vulnerabilities in the database
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.
Software | From | Fixed in |
---|---|---|
redhat / openshift | 3.1 | 3.1.x |
jenkins / jenkins | - | 1.649.x |
jenkins / jenkins | 1.642.1 | 1.642.1.x |
![]() |
- | 1.650 |