CVE-2014-3503

Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:syncope:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:syncope:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:syncope:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:syncope:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:syncope:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:syncope:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:syncope:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:syncope:1.1.7:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-07-11 14:55

Updated : 2024-02-04 18:35


NVD link : CVE-2014-3503

Mitre link : CVE-2014-3503

CVE.ORG link : CVE-2014-3503


JSON object : View

Products Affected

apache

  • syncope
CWE
CWE-310

Cryptographic Issues