- Synchronized data.

This commit is contained in:
CVE Team 2018-11-18 14:04:59 -05:00
parent d61ed54caa
commit fcb3d118ae
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
2 changed files with 149 additions and 0 deletions

View File

@ -0,0 +1,77 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2008-7320",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** DISPUTED ** GNOME Seahorse through 3.30 allows physically proximate attackers to read plaintext passwords by using the quickAllow dialog at an unattended workstation, if the keyring is unlocked. NOTE: this is disputed by a software maintainer because the behavior represents a design decision."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774",
"refsource" : "MISC",
"url" : "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774/comments/13",
"refsource" : "MISC",
"url" : "https://bugs.launchpad.net/ubuntu/+source/seahorse/+bug/189774/comments/13"
},
{
"name" : "https://bugzilla.gnome.org/show_bug.cgi?id=551036",
"refsource" : "MISC",
"url" : "https://bugzilla.gnome.org/show_bug.cgi?id=551036"
},
{
"name" : "https://www.bountysource.com/issues/3849352-seahorse-shows-passwords-without-verification",
"refsource" : "MISC",
"url" : "https://www.bountysource.com/issues/3849352-seahorse-shows-passwords-without-verification"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-19358",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365",
"refsource" : "MISC",
"url" : "https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365"
},
{
"name" : "https://github.com/sungjungk/keyring_crack",
"refsource" : "MISC",
"url" : "https://github.com/sungjungk/keyring_crack"
},
{
"name" : "https://www.youtube.com/watch?v=Do4E9ZQaPck",
"refsource" : "MISC",
"url" : "https://www.youtube.com/watch?v=Do4E9ZQaPck"
}
]
}
}