Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-0790

Опубликовано: 07 апр. 2016
Источник: debian
EPSS Низкий

Описание

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

Примечания

  • https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24

EPSS

Процентиль: 44%
0.00212
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.

redhat
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.

CVSS3: 5.3
nvd
почти 10 лет назад

Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.

CVSS3: 5.3
github
больше 3 лет назад

Exposure of Sensitive Information in Jenkins Core

EPSS

Процентиль: 44%
0.00212
Низкий