CVE-2014-3503
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0194 (1.9%)
Percentil: 83.5%
EPSS: 2026-05-06
Afecta
apache:syncopeDescripción técnica
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.
Publicada: 11/7/2014, 14:55:04
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://packetstormsecurity.com/files/127375/Apache-Syncope-Insecure-Password-Generation.html
- http://syncope.apache.org/security.html
- http://www.securityfocus.com/archive/1/532669/100/0/threaded
- http://www.securityfocus.com/bid/68431
- http://packetstormsecurity.com/files/127375/Apache-Syncope-Insecure-Password-Generation.html
- http://syncope.apache.org/security.html
- http://www.securityfocus.com/archive/1/532669/100/0/threaded
- http://www.securityfocus.com/bid/68431