Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:*:*:*:*:*:*:*:*", "matchCriteriaId": "314159CF-0626-44BC-9D5D-EE1077C3AED6", "versionEndIncluding": "0.4.13-2", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5BBB719-4CA3-46CB-BF18-1B6D83C640C7", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "728EBEA8-8D8B-4FC2-9DCD-B6543DC04FA4", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "6763F981-8A35-4A2E-A699-06227B8FC628", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEAF6C4D-54F0-4224-A84B-F11A8DFE6AE0", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB3C5098-149B-4CC4-8091-2CEC591F95D5", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD152ECE-AB36-4602-995C-AEDE9A42D6F9", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "93378459-2D11-4570-A15B-E4E9B1E0B34D", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "D8A2E5A2-15A3-442A-97A8-778745898D58", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BCF2830E-DF74-4FC9-82B5-711EE75637A8", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C1363B73-25C3-4B3C-BCBF-DB848D740345", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "50DAC843-9A69-4BF0-B491-28CFFF6528B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "CC044A19-8A72-4953-8AFB-658334D7748A", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A20FD9A-5E5B-4A5A-9173-AEC93B661FFF", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "DACFF6F5-BBCA-41DD-886F-BBC3331CF59E", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "F94F2634-19D7-4192-9482-A2E5B2F32643", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "799BFE0D-9A8A-490C-822A-20323006A7F2", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "03869FC3-75E3-44F7-8E65-EA90DA6152D6", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "1E55FCC6-8D3D-4094-9DC1-63E94E8092A0", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "044857B2-A1B3-4017-953D-67D70E16AAA9", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "FD94093A-523A-4878-9C01-F943B4CC8D11", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "D59D8D21-4438-418F-9AC6-4543DA32E255", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "CEAD892F-F054-436A-8465-76D214C37A71", "vulnerable": true}, {"criteria": "cpe:2.3:a:mikel_olasagasti:revelation:0.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "405092E2-81E9-4DF6-B4C8-1C11DC386255", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Revelation 0.4.13-2 and earlier does not iterate through SHA hashing algorithms for AES encryption, which makes it easier for context-dependent attackers to guess passwords via a brute force attack."}, {"lang": "es", "value": "Revelation v0.4.13-2 y anteriores no iterar a trav\u00e9s de algoritmos de hash SHA para cifrado AES, lo que hace m\u00e1s f\u00e1cil para los atacantes dependientes de contexto adivinar las contrase\u00f1as a trav\u00e9s de un ataque de fuerza bruta."}], "id": "CVE-2012-2743", "lastModified": "2024-11-21T01:39:33.163", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-06-27T22:55:01.597", "references": [{"source": "secalert@redhat.com", "url": "http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html"}, {"source": "secalert@redhat.com", "url": "http://oss.codepoet.no/revelation/issue/61/file-format-magic-string-version-mismatch"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/18/1"}, {"source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/06/18/3"}, {"source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/54060"}, {"source": "secalert@redhat.com", "url": "https://bugs.gentoo.org/show_bug.cgi?id=421571"}, {"source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76408"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://oss.codepoet.no/revelation/issue/61/file-format-magic-string-version-mismatch"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/18/1"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/06/18/3"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/54060"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.gentoo.org/show_bug.cgi?id=421571"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76408"}], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-255"}], "source": "nvd@nist.gov", "type": "Primary"}]}