CVE-2025-30258
- EPSS 0.02%
- Published 19.03.2025 00:00:00
- Last modified 19.03.2025 20:15:20
In GnuPG before 2.5.5, if a user chooses to import a certificate with certain crafted subkey data that lacks a valid backsig or that has incorrect usage flags, the user loses the ability to verify signatures made from certain other signing keys, aka ...
CVE-2022-3219
- EPSS 0.01%
- Published 23.02.2023 20:15:12
- Last modified 12.03.2025 21:15:38
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
CVE-2022-3515
- EPSS 0.13%
- Published 12.01.2023 15:15:10
- Last modified 08.04.2025 16:15:19
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, ...
CVE-2022-34903
- EPSS 2.12%
- Published 01.07.2022 22:15:08
- Last modified 21.11.2024 07:10:24
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
CVE-2020-25125
- EPSS 0.33%
- Published 03.09.2020 18:15:15
- Last modified 21.11.2024 05:17:24
GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check...
CVE-2019-14855
- EPSS 0.14%
- Published 20.03.2020 16:15:14
- Last modified 21.11.2024 04:27:30
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
CVE-2015-0837
- EPSS 0.55%
- Published 29.11.2019 22:15:11
- Last modified 21.11.2024 02:23:49
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cach...
CVE-2014-3591
- EPSS 0.14%
- Published 29.11.2019 22:15:11
- Last modified 21.11.2024 02:08:27
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluct...
CVE-2011-2207
- EPSS 1.45%
- Published 27.11.2019 19:15:11
- Last modified 21.11.2024 01:27:49
dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to cause a denial of service (DOS) via a specially-crafted certificate.
CVE-2015-1607
- EPSS 0.63%
- Published 20.11.2019 19:15:11
- Last modified 21.11.2024 02:25:46
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, rela...