Gpg4win

Gpg4win

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.13%
  • Published 12.01.2023 15:15:10
  • Last modified 08.04.2025 16:15:19

A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, ...

Exploit
  • EPSS 0.33%
  • Published 03.09.2020 18:15:15
  • Last modified 21.11.2024 05:17:24

GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check...

Exploit
  • EPSS 1.33%
  • Published 27.10.2009 16:30:00
  • Last modified 09.04.2025 00:30:58

gpg2.exe in Gpg4win 2.0.1, as used in KDE Kleopatra 2.0.11, allows remote attackers to cause a denial of service (application crash) via a long certificate signature.

  • EPSS 8.9%
  • Published 07.12.2006 11:28:00
  • Last modified 09.04.2025 00:30:58

A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated s...