Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jr5c-vgqw-77hv

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

EPSS

Процентиль: 27%
0.00096
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

redhat
больше 13 лет назад

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

nvd
больше 13 лет назад

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.

debian
больше 13 лет назад

GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set ...

EPSS

Процентиль: 27%
0.00096
Низкий