Gnu Privacy Guard vulnerabilities
10 known vulnerabilities affecting gnu/privacy_guard.
Total CVEs
10
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH3MEDIUM4LOW1
Vulnerabilities
Page 1 of 1
CVE-2006-6235CRITICALCVSS 10.0v1.2.4v1.2.5+17 more2006-12-07
CVE-2006-6235 [CRITICAL] CVE-2006-6235: A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 throu
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
nvd
CVE-2006-0049MEDIUMCVSS 5.0v1.0v1.0.1+21 more2006-03-13
CVE-2006-0049 [MEDIUM] CVE-2006-0049: gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
nvd
CVE-2006-0455MEDIUMCVSS 4.6PoCv1.0v1.0.1+20 more2006-02-15
CVE-2006-0455 [MEDIUM] CVE-2006-0455: gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in
gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".
nvd
CVE-2003-0978HIGHCVSS 7.5v1.2v1.2.1+3 more2004-01-05
CVE-2003-0978 [HIGH] CVE-2003-0978: Format string vulnerability in gpgkeys_hkp (experimental HKP interface) for the GnuPG (gpg) client 1
Format string vulnerability in gpgkeys_hkp (experimental HKP interface) for the GnuPG (gpg) client 1.2.3 and earlier, and 1.3.3 and earlier, allows remote attackers or a malicious keyserver to cause a denial of service (crash) and possibly execute arbitrary code during key retrieval.
nvd
CVE-2003-0971MEDIUMCVSS 5.0v1.0.2v1.0.3+9 more2003-12-15
CVE-2003-0971 [MEDIUM] CVE-2003-0971: GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using
GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.
nvd
CVE-2003-0255CRITICALCVSS 10.0≤ 1.2.12003-05-27
CVE-2003-0255 [CRITICAL] CVE-2003-0255: The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with
The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.
nvd
CVE-2001-0522HIGHCVSS 7.5PoCv7.1v7.2+1 more2001-08-14
CVE-2001-0522 [HIGH] CVE-2001-0522: Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an at
Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges via format strings in the original filename that is stored in an encrypted file.
nvd
CVE-2001-0072MEDIUMCVSS 5.0v1.0v1.0.1+3 more2001-02-12
CVE-2001-0072 [MEDIUM] CVE-2001-0072: gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key server
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.
nvd
CVE-2001-0071LOWCVSS 2.1v1.0v1.0.1+3 more2001-02-12
CVE-2001-0071 [LOW] CVE-2001-0071: gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
nvd
CVE-2000-0974HIGHCVSS 7.5v1.0v1.0.1+2 more2000-12-19
CVE-2000-0974 [HIGH] CVE-2000-0974: GnuPG (gpg) 1.0.3 does not properly check all signatures of a file containing multiple documents, wh
GnuPG (gpg) 1.0.3 does not properly check all signatures of a file containing multiple documents, which allows an attacker to modify contents of all documents but the first without detection.
nvd