Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2012-6111
Disclosure Date: December 20, 2019 (last updated November 27, 2024)
gnome-keyring does not discard stored secrets when using gnome_keyring_lock_all_sync function
0
Attacker Value
Unknown
CVE-2012-5578
Disclosure Date: November 25, 2019 (last updated November 27, 2024)
Python keyring has insecure permissions on new databases allowing world-readable files to be created
0
Attacker Value
Unknown
CVE-2012-5577
Disclosure Date: October 28, 2019 (last updated November 27, 2024)
Python keyring lib before 0.10 created keyring files with world-readable permissions.
0
Attacker Value
Unknown
CVE-2018-20781
Disclosure Date: February 12, 2019 (last updated November 27, 2024)
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
0
Attacker Value
Unknown
CVE-2018-19358
Disclosure Date: November 18, 2018 (last updated November 08, 2023)
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.
0
Attacker Value
Unknown
CVE-2012-4571
Disclosure Date: November 30, 2012 (last updated October 05, 2023)
Python Keyring 0.9.1 does not securely initialize the cipher when encrypting passwords for CryptedFileKeyring files, which makes it easier for local users to obtain passwords via a brute-force attack.
0
Attacker Value
Unknown
CVE-2012-3466
Disclosure Date: October 22, 2012 (last updated October 05, 2023)
GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.
0