Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
libksba library vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2006-5111
The libksba library 0.9.12 and possibly other versions, as used by gpgsm in the newpg package on SUSE LINUX, allows malicious users to cause a denial of service (application crash) via a malformed X.509 certificate in a signature.
Libksba Library Libksba Library 0.9.12
NA
CVE-2022-3515
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
Gnupg Libksba
Gpg4win Gpg4win
Gnupg Vs-desktop
Gnupg Gnupg
NA
CVE-2022-47629
Libksba prior to 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.
Gnupg Libksba
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.5
CVSSv2
CVE-2014-9087
Integer underflow in the ksba_oid_to_str function in Libksba prior to 1.3.2, as used in GnuPG, allows remote malicious users to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
Mageia Mageia 3.0
Mageia Mageia 4.0
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Gnupg Libksba
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 14.04
Gnupg Gnupg 2.1.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started