Pgp

Pgp

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 31.12.2002 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Network Associates PGP 7.0.4 and 7.1 does not time out according to the value set in the "Passphrase Cache" option, which could allow attackers to open encrypted files without providing a passphrase.

  • EPSS 0.54%
  • Veröffentlicht 04.09.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user belie...

  • EPSS 0.08%
  • Veröffentlicht 02.07.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The split key mechanism used by PGP 7.0 allows a key share holder to obtain access to the entire key by setting the "Cache passphrase while logged on" option and capturing the passphrases of other share holders as they authenticate.

  • EPSS 0.64%
  • Veröffentlicht 18.06.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

ASCII Armor parser in Windows PGP 7.0.3 and earlier allows attackers to create files in arbitrary locations via a malformed ASCII armored file.

  • EPSS 0.45%
  • Veröffentlicht 20.10.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

PGP 5.5.x through 6.5.3 does not properly check if an Additional Decryption Key (ADK) is stored in the signed portion of a public certificate, which allows an attacker who can modify a victim's public certificate to decrypt any data that has been enc...

  • EPSS 0.26%
  • Veröffentlicht 24.05.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The pgpk command in PGP 5.x on Unix systems uses an insufficiently random data source for non-interactive key pair generation, which may produce predictable keys.