Jenkins Exposure of Sensitive Information to an Unauthorized Actor Vulnerability - CVE-2016-0790
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens which makes it easier for remote attackers to determine API tokens via a brute-force approach.