Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hfpc-f259-2f2x

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.

The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.

EPSS

Процентиль: 24%
0.0008
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.

redhat
больше 12 лет назад

The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.

nvd
около 12 лет назад

The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.

debian
около 12 лет назад

The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlie ...

EPSS

Процентиль: 24%
0.0008
Низкий