CVE-2025-47934
- EPSS 0.04%
- Veröffentlicht 19.05.2025 18:57:05
- Zuletzt bearbeitet 21.05.2025 20:25:16
OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. Startinf in version 5.0.1 and prior to versions 5.11.3 and 6.1.1, a maliciously modified message can be passed to either `openpgp.verify` or `openpgp.decrypt`, causing these functions...
CVE-2023-41037
- EPSS 0.08%
- Veröffentlicht 29.08.2023 17:15:13
- Zuletzt bearbeitet 21.11.2024 08:20:25
OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In affected versions OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools. These messages typically contain ...
CVE-2019-9153
- EPSS 0.36%
- Veröffentlicht 22.08.2019 16:15:10
- Zuletzt bearbeitet 21.11.2024 04:51:05
Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to forge signed messages by replacing its signatures with a "standalone" or "timestamp" signature.
CVE-2019-9154
- EPSS 0.39%
- Veröffentlicht 22.08.2019 16:15:10
- Zuletzt bearbeitet 21.11.2024 04:51:05
Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to pass off unsigned data as signed.
CVE-2019-9155
- EPSS 0.31%
- Veröffentlicht 22.08.2019 16:15:10
- Zuletzt bearbeitet 21.11.2024 04:51:05
A cryptographic issue in OpenPGP.js <=4.2.0 allows an attacker who is able provide forged messages and gain feedback about whether decryption of these messages succeeded to conduct an invalid curve attack in order to gain the victim's ECDH private ke...
CVE-2015-8013
- EPSS 1.08%
- Veröffentlicht 25.07.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
s2k.js in OpenPGP.js will decrypt arbitrary messages regardless of passphrase for crafted PGP keys which allows remote attackers to bypass authentication if message decryption is used as an authentication mechanism via a crafted symmetrically encrypt...