GHSA-4c72-mrhf-23cg

Suggest an improvement
Source
https://github.com/advisories/GHSA-4c72-mrhf-23cg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-4c72-mrhf-23cg/GHSA-4c72-mrhf-23cg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4c72-mrhf-23cg
Aliases
  • CVE-2014-3503
Published
2022-05-14T02:52:41Z
Modified
2024-12-08T05:27:43.019566Z
Summary
Apache Syncope uses a weak PNRG
Details

Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Database specific
{
    "nvd_published_at": "2014-07-11T14:55:00Z",
    "cwe_ids": [
        "CWE-338"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-15T22:11:49Z"
}
References

Affected packages

Maven / org.apache.syncope:syncope

Package

Name
org.apache.syncope:syncope
View open source insights on deps.dev
Purl
pkg:maven/org.apache.syncope/syncope

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.1.0
Fixed
1.1.8

Affected versions

1.*

1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
1.1.7