CVE-2014-3503
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0194 (1.9%)
Percentile: 83.5%
EPSS: 2026-05-06
Affects
apache:syncopeTechnical description
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.
Published: 7/11/2014, 2:55:04 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://packetstormsecurity.com/files/127375/Apache-Syncope-Insecure-Password-Generation.html
- http://syncope.apache.org/security.html
- http://www.securityfocus.com/archive/1/532669/100/0/threaded
- http://www.securityfocus.com/bid/68431
- http://packetstormsecurity.com/files/127375/Apache-Syncope-Insecure-Password-Generation.html
- http://syncope.apache.org/security.html
- http://www.securityfocus.com/archive/1/532669/100/0/threaded
- http://www.securityfocus.com/bid/68431