Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnupg vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2016-4579
Libksba prior to 1.3.4 allows remote malicious users to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."
Gnupg Libksba
Opensuse Leap 42.1
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
6.8
CVSSv3
CVE-2017-7526
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computatio...
Gnupg Libgcrypt
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Debian Debian Linux 8.0
Debian Debian Linux 9.0
2
CVSSv3
CVE-2015-7511
Libgcrypt prior to 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate malicious users to extract ECDH keys by measuring electromagnetic emanations.
Gnupg Libgcrypt
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
1 Article
7.5
CVSSv3
CVE-2016-4574
Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba prior to 1.3.4 allows remote malicious users to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for C...
Gnupg Libksba
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 15.10
Canonical Ubuntu Linux 14.04
Opensuse Leap 42.1
Opensuse Opensuse 13.2
7.5
CVSSv3
CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent malicious users to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input...
Python Python-gnupg 0.4.3
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Opensuse Leap 15.0
Suse Backports -
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
3 Github repositories
NA
CVE-2006-0455
gpgv in GnuPG prior to 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded....
Gnu Privacy Guard 1.4.2
Gnu Privacy Guard 1.4
Gnu Privacy Guard 1.4.1
Gnu Privacy Guard 1.0.3
Gnu Privacy Guard 1.2.1
Gnu Privacy Guard 1.0.7
Gnu Privacy Guard 1.0.5
Gnu Privacy Guard 1.0.6
Gnu Privacy Guard 1.3.3
Gnu Privacy Guard 1.2.2
Gnu Privacy Guard 1.0
Gnu Privacy Guard 1.0.2
Gnu Privacy Guard 1.2.3
Gnu Privacy Guard 1.2.6
Gnu Privacy Guard 1.2.5
Gnu Privacy Guard 1.0.4
Gnu Privacy Guard 1.3.4
Gnu Privacy Guard 1.0.1
Gnu Privacy Guard 1.0.3b
Gnu Privacy Guard 1.2
Gnu Privacy Guard 1.2.7
Gnu Privacy Guard 1.2.4
1 EDB exploit
NA
CVE-2006-0049
gpg in GnuPG prior to 1.4.2.2 does not properly verify non-detached signatures, which allows malicious users to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is ...
Gnu Privacy Guard 1.0
Gnu Privacy Guard 1.0.1
Gnu Privacy Guard 1.0.7
Gnu Privacy Guard 1.2
Gnu Privacy Guard 1.2.7
Gnu Privacy Guard 1.3.3
Gnu Privacy Guard 1.0.5
Gnu Privacy Guard 1.0.6
Gnu Privacy Guard 1.2.5
Gnu Privacy Guard 1.2.6
Gnu Privacy Guard 1.4.2.1
Gnu Privacy Guard 1.0.2
Gnu Privacy Guard 1.0.3
Gnu Privacy Guard 1.2.1
Gnu Privacy Guard 1.2.2
Gnu Privacy Guard 1.3.4
Gnu Privacy Guard 1.4
Gnu Privacy Guard 1.0.3b
Gnu Privacy Guard 1.0.4
Gnu Privacy Guard 1.2.3
Gnu Privacy Guard 1.2.4
Gnu Privacy Guard 1.4.1
NA
CVE-2006-6235
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x prior to 1.4.6, 2.x prior to 2.0.2, and 1.9.0 up to and including 1.9.95 allows malicious users to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated...
Gnu Privacy Guard 1.3.4
Gnu Privacy Guard 1.4
Gnu Privacy Guard 1.4.1
Gnu Privacy Guard 1.9.10
Gnu Privacy Guard 1.9.15
Gnu Privacy Guard 1.2.7
Gnu Privacy Guard 1.3.3
Gnu Privacy Guard 1.4.4
Gnu Privacy Guard 1.4.5
Gnu Privacy Guard 1.2.4
Gnu Privacy Guard 1.4.2
Gnu Privacy Guard 1.4.2.1
Gnu Privacy Guard 1.9.20
Gnu Privacy Guard 2.0
Gnu Privacy Guard 1.2.5
Gnu Privacy Guard 1.2.6
Gnu Privacy Guard 1.4.2.2
Gnu Privacy Guard 1.4.3
Gnu Privacy Guard 2.0.1
Gpg4win Gpg4win 1.0.7
Redhat Enterprise Linux 4.0
Ubuntu Ubuntu Linux 5.10
NA
CVE-2003-0971
GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows malicious users to determine the private key from a signature.
Gnu Privacy Guard 1.0.2
Gnu Privacy Guard 1.2.1
Gnu Privacy Guard 1.2.2
Gnu Privacy Guard 1.0.7
Gnu Privacy Guard 1.2
Gnu Privacy Guard 1.0.3
Gnu Privacy Guard 1.0.3b
Gnu Privacy Guard 1.2.3
Gnu Privacy Guard 1.0.4
Gnu Privacy Guard 1.0.5
Gnu Privacy Guard 1.0.6
14 Github repositories
NA
CVE-2003-0255
The key validation code in GnuPG prior to 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.
Gnu Privacy Guard
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »