Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
pgp pgp 7.1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2002-1977
Network Associates PGP 7.0.4 and 7.1 does not time out according to the value set in the "Passphrase Cache" option, which could allow malicious users to open encrypted files without providing a passphrase.
Pgp Pgp 7.0.4
Pgp Pgp 7.1
7.5
CVSSv2
CVE-2001-1016
PGP Corporate Desktop prior to 7.1, Personal Security prior to 7.0.3, Freeware prior to 7.0.3, and E-Business Server prior to 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an malicious user to make the user believe that the...
Pgp Freeware 7.0.3
Pgp E-business Server 6.5.8
Pgp Corporate Desktop 7.1
Pgp Pgp 6.0.2
Pgp Pgp 5.0
Pgp Personal Security 7.0.3
Pgp E-business Server 7.1
Pgp E-business Server 7.0.4
2.1
CVSSv2
CVE-2002-0788
An interaction between PGP 7.0.3 with the "wipe deleted files" option, when used on Windows Encrypted File System (EFS), creates a cleartext temporary files that cannot be wiped or deleted due to strong permissions, which could allow certain local users or attackers wit...
Pgp Freeware 7.0.3
Pgp Corporate Desktop 7.1
Pgp Personal Security 7.0.3
5
CVSSv2
CVE-2002-0208
PGP Security PGPfire 7.1 for Windows alters the system's TCP/IP stack and modifies packets in ICMP error messages in a way that allows remote malicious users to determine that the system is running PGPfire.
Network.associates Pgpfire 7.1
7.5
CVSSv2
CVE-2001-0522
Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and previous versions can allow an malicious user to gain privileges via format strings in the original filename that is stored in an encrypted file.
Gnu Privacy Guard 7.2
Gnu Privacy Guard 8.0
Gnu Privacy Guard 7.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started