Количество 5
Количество 5
CVE-2016-0790
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.
CVE-2016-0790
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.
CVE-2016-0790
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.
CVE-2016-0790
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time ...
GHSA-jgpr-qrw2-6gp3
Exposure of Sensitive Information in Jenkins Core
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-0790 Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach. | CVSS3: 5.3 | 0% Низкий | почти 10 лет назад | |
CVE-2016-0790 Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach. | CVSS2: 5.1 | 0% Низкий | почти 10 лет назад | |
CVE-2016-0790 Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach. | CVSS3: 5.3 | 0% Низкий | почти 10 лет назад | |
CVE-2016-0790 Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time ... | CVSS3: 5.3 | 0% Низкий | почти 10 лет назад | |
GHSA-jgpr-qrw2-6gp3 Exposure of Sensitive Information in Jenkins Core | CVSS3: 5.3 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу