Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pgp desktop vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0685
Heap-based buffer overflow in the message decoding functionality for PGP Outlook Encryption Plug-In, as used in NAI PGP Desktop Security 7.0.4, Personal Security 7.0.3, and Freeware 7.0.3, allows remote malicious users to modify the heap and gain privileges via a large, malformed...
Pgp Desktop Security 7.0.4
Pgp Freeware 7.0.3
Pgp Personal Security 7.0.3
2.1
CVSSv2
CVE-2002-0788
An interaction between PGP 7.0.3 with the "wipe deleted files" option, when used on Windows Encrypted File System (EFS), creates a cleartext temporary files that cannot be wiped or deleted due to strong permissions, which could allow certain local users or attackers wit...
Pgp Freeware 7.0.3
Pgp Corporate Desktop 7.1
Pgp Personal Security 7.0.3
7.5
CVSSv2
CVE-2001-1016
PGP Corporate Desktop prior to 7.1, Personal Security prior to 7.0.3, Freeware prior to 7.0.3, and E-Business Server prior to 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an malicious user to make the user believe that the...
Pgp Pgp 5.0
Pgp Pgp 6.0.2
Pgp Corporate Desktop 7.1
Pgp E-business Server 6.5.8
Pgp Freeware 7.0.3
Pgp Personal Security 7.0.3
Pgp E-business Server 7.0.4
Pgp E-business Server 7.1
7.1
CVSSv2
CVE-2007-0603
PGP Desktop prior to 9.5.1 does not validate data objects received over the (1) \pipe\pgpserv named pipe for PGPServ.exe or the (2) \pipe\pgpsdkserv named pipe for PGPsdkServ.exe, which allows remote authenticated users to gain privileges by sending a data object representing an ...
Pgp Corporate Desktop 9.5
7.5
CVSSv2
CVE-2002-0850
Buffer overflow in PGP Corporate Desktop 7.1.1 allows remote malicious users to execute arbitrary code via an encrypted document that has a long filename when it is decrypted.
Pgp Corporate Desktop 7.1.1
4.4
CVSSv2
CVE-2012-6533
Buffer overflow in pgpwded.sys in Symantec PGP Desktop 10.x and Encryption Desktop 10.3.0 before MP1 on Windows XP and Server 2003 allows local users to gain privileges via a crafted application.
Symantec Pgp Desktop 10.0.0
Symantec Pgp Desktop 10.2.0
Symantec Pgp Desktop 10.0.2
Symantec Pgp Desktop 10.0.3
Symantec Pgp Desktop 10.1.0
Symantec Pgp Desktop 10.1.1
Symantec Pgp Desktop 10.0.1
Symantec Pgp Desktop 10.1.2
Symantec Pgp Desktop 10.2.1
Symantec Encryption Desktop 10.3.0
1 EDB exploit
4.3
CVSSv2
CVE-2018-12373
dDecrypted S/MIME parts hidden with CSS or the plaintext HTML tag can leak plaintext when included in a HTML reply/forward. This vulnerability affects Thunderbird < 52.9.
Mozilla Thunderbird
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux 7.6
Redhat Enterprise Linux 7.5
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux Workstation 7.0
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 18.04
1 Article
4.3
CVSSv2
CVE-2014-3431
Symantec PGP Desktop 10.x, and Encryption Desktop Professional 10.3.x prior to 10.3.2 MP2, on OS X uses world-writable permissions for temporary files, which allows local users to bypass intended restrictions on file reading, modification, creation, and permission changes via uns...
Symantec Pgp Desktop 10.0.0
Symantec Pgp Desktop 10.0.1
Symantec Pgp Desktop 10.2.1
Symantec Pgp Desktop 10.2.2
Symantec Encryption Desktop 10.3.0
Symantec Encryption Desktop 10.3.1
Symantec Pgp Desktop 10.1.0
Symantec Pgp Desktop 10.1.1
Symantec Pgp Desktop 10.0.2
Symantec Pgp Desktop 10.0.3
Symantec Encryption Desktop 10.3.2
Symantec Pgp Desktop 10.1.2
Symantec Pgp Desktop 10.2.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2