{"id":"CVE-2014-9970","details":"jasypt before 1.9.2 allows a timing attack against the password hash comparison.","aliases":["GHSA-r5c2-rxh2-f5h2"],"modified":"2026-04-10T03:45:01.284262Z","published":"2017-05-21T18:29:00Z","references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2546"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2547"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2808"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2809"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2810"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2811"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:3141"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0294"},{"type":"ADVISORY","url":"https://sourceforge.net/p/jasypt/code/668/"},{"type":"FIX","url":"https://sourceforge.net/p/jasypt/code/668/"},{"type":"REPORT","url":"https://sourceforge.net/p/jasypt/code/668/"},{"type":"WEB","url":"http://www.securitytracker.com/id/1039744"},{"type":"WEB","url":"http://www.securitytracker.com/id/1040360"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}