Max CVSS | 10.0 | Min CVSS | 4.6 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2006-0455 | 4.6 |
gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature
|
13-02-2023 - 02:16 | 15-02-2006 - 22:06 | |
CVE-2006-3082 | 5.0 |
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to a
|
18-10-2018 - 16:45 | 19-06-2006 - 18:02 | |
CVE-2006-6235 | 10.0 |
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated s
|
17-10-2018 - 21:47 | 07-12-2006 - 11:28 | |
CVE-2006-3746 | 5.0 |
Integer overflow in parse_comment in GnuPG (gpg) 1.4.4 allows remote attackers to cause a denial of service (segmentation fault) via a crafted message.
|
17-10-2018 - 21:29 | 28-07-2006 - 21:04 | |
CVE-2007-1263 | 5.0 |
GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a mes
|
16-10-2018 - 16:37 | 06-03-2007 - 20:19 |