Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pgp vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2015-7385
Cross-site scripting (XSS) vulnerability in Open-Xchange OX Guard prior to 2.0.0-rev11 allows remote malicious users to inject arbitrary web script or HTML via the uid field in a PGP public key, which is not properly handled in "Guard PGP Settings."
Open-xchange Ox Guard
4.6
CVSSv2
CVE-1999-1270
KMail in KDE 1.0 provides a PGP passphrase as a command line argument to other programs, which could allow local users to obtain the passphrase and compromise the PGP keys of other users by viewing the arguments via programs that list process information, such as ps.
Kde Kde 1.0
6.4
CVSSv2
CVE-2017-7229
PGP/MIME encrypted messages injected into a Vaultive O365 (prior to 4.5.21) frontend via IMAP or SMTP have their Content-Type changed from 'Content-Type: multipart/encrypted; protocol="application/pgp-encrypted"; boundary="abc123abc123"' to 'Con...
Vaultive Office 365 Security 4.5.19
4.3
CVSSv2
CVE-2019-16370
The PGP signing plugin in Gradle prior to 6.0 relies on the SHA-1 algorithm, which might allow an malicious user to replace an artifact with a different one that has the same SHA-1 message digest, a related issue to CVE-2005-4900.
Gradle Gradle
3.3
CVSSv2
CVE-2020-10759
A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or...
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
1 Github repository
4.3
CVSSv2
CVE-2018-15586
Enigmail prior to 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email.
Enigmail Enigmail
4.3
CVSSv2
CVE-2007-3779
PHP local file inclusion vulnerability in gpg_pop_init.php in the G/PGP (GPG) Plugin prior to 20070707 for Squirrelmail allows remote malicious users to include and execute arbitrary local files, related to the MOD parameter.
Squirrelmail Gpg Plugin 2.1
4.4
CVSSv2
CVE-2012-6533
Buffer overflow in pgpwded.sys in Symantec PGP Desktop 10.x and Encryption Desktop 10.3.0 before MP1 on Windows XP and Server 2003 allows local users to gain privileges via a crafted application.
Symantec Pgp Desktop 10.0.0
Symantec Pgp Desktop 10.2.0
Symantec Pgp Desktop 10.0.2
Symantec Pgp Desktop 10.0.3
Symantec Pgp Desktop 10.1.0
Symantec Pgp Desktop 10.1.1
Symantec Pgp Desktop 10.0.1
Symantec Pgp Desktop 10.1.2
Symantec Pgp Desktop 10.2.1
Symantec Encryption Desktop 10.3.0
1 EDB exploit
5
CVSSv2
CVE-2002-0208
PGP Security PGPfire 7.1 for Windows alters the system's TCP/IP stack and modifies packets in ICMP error messages in a way that allows remote malicious users to determine that the system is running PGPfire.
Network.associates Pgpfire 7.1
NA
CVE-2016-20021
In Gentoo Portage prior to 3.0.47, there is missing PGP validation of executed code: the standalone emerge-webrsync downloads a .gpgsig file but does not perform signature verification. Unless emerge-webrsync is used, Portage is not vulnerable.
Gentoo Portage
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »