CVE-2019-14855
- EPSS 0.4%
- Veröffentlicht 20.03.2020 16:15:14
- Zuletzt bearbeitet 21.11.2024 04:27:30
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
CVE-2015-0837
- EPSS 0.68%
- Veröffentlicht 29.11.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 02:23:49
The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cach...
CVE-2014-3591
- EPSS 0.14%
- Veröffentlicht 29.11.2019 22:15:11
- Zuletzt bearbeitet 21.11.2024 02:08:27
Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluct...
CVE-2011-2207
- EPSS 1.45%
- Veröffentlicht 27.11.2019 19:15:11
- Zuletzt bearbeitet 21.11.2024 01:27:49
dirmngr before 2.1.0 improperly handles certain system calls, which allows remote attackers to cause a denial of service (DOS) via a specially-crafted certificate.
CVE-2015-1607
- EPSS 0.63%
- Veröffentlicht 20.11.2019 19:15:11
- Zuletzt bearbeitet 21.11.2024 02:25:46
kbx/keybox-search.c in GnuPG before 1.4.19, 2.0.x before 2.0.27, and 2.1.x before 2.1.2 does not properly handle bitwise left-shifts, which allows remote attackers to cause a denial of service (invalid read operation) via a crafted keyring file, rela...
CVE-2015-1606
- EPSS 0.47%
- Veröffentlicht 20.11.2019 19:15:11
- Zuletzt bearbeitet 21.11.2024 02:25:45
The keyring DB in GnuPG before 2.1.2 does not properly handle invalid packets, which allows remote attackers to cause a denial of service (invalid read and use-after-free) via a crafted keyring file.
CVE-2019-13050
- EPSS 0.74%
- Veröffentlicht 29.06.2019 17:15:08
- Zuletzt bearbeitet 21.11.2024 04:24:06
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this n...
CVE-2018-1000858
- EPSS 0.2%
- Veröffentlicht 20.12.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 03:40:30
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e...
CVE-2018-12020
- EPSS 2.8%
- Veröffentlicht 08.06.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:44:25
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" optio...
CVE-2018-9234
- EPSS 0.17%
- Veröffentlicht 04.04.2018 00:29:00
- Zuletzt bearbeitet 21.11.2024 04:15:10
GnuPG 2.2.4 and 2.2.5 does not enforce a configuration in which key certification requires an offline master Certify key, which results in apparently valid certifications that occurred only with access to a signing subkey.