Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnupg vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2018-19205
Roundcube prior to 1.3.7 mishandles GnuPG MDC integrity-protection warnings, which makes it easier for malicious users to obtain sensitive information, a related issue to CVE-2017-17688. This is associated with plugins/enigma/lib/enigma_driver_gnupg.php.
Roundcube Webmail
445
VMScore
CVE-2001-0072
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an malicious user to break the web of trust.
Gnu Privacy Guard 1.0.2
Gnu Privacy Guard 1.0.3
Gnu Privacy Guard 1.0.3b
Gnu Privacy Guard 1.0
Gnu Privacy Guard 1.0.1
668
VMScore
CVE-2003-0978
Format string vulnerability in gpgkeys_hkp (experimental HKP interface) for the GnuPG (gpg) client 1.2.3 and previous versions, and 1.3.3 and previous versions, allows remote attackers or a malicious keyserver to cause a denial of service (crash) and possibly execute arbitrary co...
Gnu Privacy Guard 1.2.2
Gnu Privacy Guard 1.2
Gnu Privacy Guard 1.2.1
Gnu Privacy Guard 1.2.3
Gnu Privacy Guard 1.3.3
578
VMScore
CVE-2020-24972
The Kleopatra component prior to 3.1.12 (and prior to 20.07.80) for GnuPG allows remote malicious users to execute arbitrary code because openpgp4fpr: URLs are supported without safe handling of command-line options. The Qt platformpluginpath command-line option can be used to lo...
Kleopatra Project Kleopatra
Fedoraproject Fedora 32
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
694
VMScore
CVE-2007-1265
KMail 1.9.5 and previous versions does not properly use the --status-fd argument when invoking GnuPG, which prevents KMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote malicious users to forge ...
Kde K-mail 1.0.27
Kde K-mail 1.0.28
Kde K-mail 1.2
Kde K-mail 1.3.1
Kde K-mail 1.92
Kde K-mail 1.93
Kde K-mail 1.0.25
Kde K-mail 1.0.26
Kde K-mail 1.101
Kde K-mail 1.102
Kde K-mail 1.89
Kde K-mail 1.9.1
Kde K-mail 1.90
Kde K-mail 0.0.29.2
Kde K-mail 1.0.29
Kde K-mail 1.0.29.1
Kde K-mail 1.7.1
Kde K-mail 1.86.2.36
Kde K-mail 1.94
Kde K-mail 1.95
Kde K-mail 1.0.23
Kde K-mail 1.0.24
445
VMScore
CVE-2007-1267
Sylpheed 2.2.7 and previous versions does not properly use the --status-fd argument when invoking GnuPG, which prevents Sylpheed from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote malicious users to ...
Sylpheed Sylpheed
445
VMScore
CVE-2007-1268
Mutt 1.5.13 and previous versions does not properly use the --status-fd argument when invoking GnuPG, which prevents Mutt from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote malicious users to forge t...
Mutt Mutt
445
VMScore
CVE-2007-1269
GNUMail 1.1.2 and previous versions does not properly use the --status-fd argument when invoking GnuPG, which prevents GNUMail from visually distinguishing between signed and unsigned portions of OpenPGP messages with multiple components, which allows remote malicious users to fo...
Gnu Gnumail
231
VMScore
CVE-2012-3587
APT 0.7.x prior to 0.7.25 and 0.8.x prior to 0.8.16, when using the apt-key net-update to import keyrings, relies on GnuPG argument order and does not check GPG subkeys, which might allow remote malicious users to install Trojan horse packages via a man-in-the-middle (MITM) attac...
Debian Advanced Package Tool 0.7.21
Debian Advanced Package Tool 0.7.20.2
Debian Advanced Package Tool 0.7.20.1
Debian Advanced Package Tool 0.7.20
Debian Advanced Package Tool 0.7.15
Debian Advanced Package Tool 0.7.14
Debian Advanced Package Tool 0.7.13
Debian Advanced Package Tool 0.8.15.1
Debian Advanced Package Tool 0.8.15
Debian Advanced Package Tool 0.8.14.1
Debian Advanced Package Tool 0.8.14
Debian Advanced Package Tool 0.8.10
Debian Advanced Package Tool 0.8.1
Debian Advanced Package Tool 0.8.0
Debian Advanced Package Tool 0.7.23.1
Debian Advanced Package Tool 0.7.22.2
Debian Advanced Package Tool 0.7.22
Debian Advanced Package Tool 0.7.2-0.1
Debian Advanced Package Tool 0.7.19
Debian Advanced Package Tool 0.7.16
Debian Advanced Package Tool 0.7.12
Debian Advanced Package Tool 0.7.10
445
VMScore
CVE-2012-4884
Argument injection vulnerability in Request Tracker (RT) 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8 allows remote malicious users to create arbitrary files via unspecified vectors related to the GnuPG client.
Bestpractical Rt 3.8.1
Bestpractical Rt 3.8.0
Bestpractical Rt 3.8.4
Bestpractical Rt 3.8.2
Bestpractical Rt 3.8.8
Bestpractical Rt 3.8.14
Bestpractical Rt 3.8.6
Bestpractical Rt 3.8.9
Bestpractical Rt 3.8.5
Bestpractical Rt 3.8.3
Bestpractical Rt 3.8.11
Bestpractical Rt 3.8.12
Bestpractical Rt 3.8.10
Bestpractical Rt 3.8.7
Bestpractical Rt 3.8.13
Bestpractical Rt 4.0.2
Bestpractical Rt 4.0.4
Bestpractical Rt 4.0.8
Bestpractical Rt 4.0.7
Bestpractical Rt 4.0.0
Bestpractical Rt 4.0.3
Bestpractical Rt 4.0.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
NEXT »