|Max CVSS||9.3||Min CVSS||4.3||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" optio
|18-04-2022 - 17:30||08-06-2018 - 21:29|
A remote code execution vulnerability exists in Visual Studio Code when it process environment variables after opening a project, aka 'Visual Studio Code Remote Code Execution Vulnerability'.
|21-07-2021 - 11:39||05-03-2019 - 23:29|
MailMate before 1.11.3 mishandles a suspicious HTML/MIME structure in a signed/encrypted email.
|03-10-2019 - 00:03||11-02-2019 - 17:29|
GNOME Evolution through 3.28.2 is prone to OpenPGP signatures being spoofed for arbitrary messages using a specially crafted email that contains a valid signature from the entity to be impersonated as an attachment.
|10-06-2019 - 07:29||11-02-2019 - 17:29|
A flaw during verification of certain S/MIME signatures causes emails to be shown in Thunderbird as having a valid digital signature, even if the shown message contents aren't covered by the signature. The flaw allows an attacker to reuse a valid S/M
|03-06-2019 - 19:29||26-04-2019 - 17:29|
The signature verification routine in the Airmail GPG-PGP Plugin, versions 1.0 (9) and earlier, does not verify the status of the signature at all, which allows remote attackers to spoof arbitrary email signatures by crafting a signed email with an i
|21-05-2019 - 14:07||16-05-2019 - 17:29|
The signature verification routine in install.sh in yarnpkg/website through 2018-06-05 only verifies that the yarn release is signed by any (arbitrary) key in the local keyring of the user, and does not pin the signature to the yarn release key, whic
|21-05-2019 - 14:03||16-05-2019 - 17:29|
Enigmail before 2.0.6 is prone to to OpenPGP signatures being spoofed for arbitrary messages using a PGP/INLINE signature wrapped within a specially crafted multipart HTML email.
|16-05-2019 - 18:29||11-02-2019 - 17:29|
The signature verification routine in Enigmail before 2.0.7 interprets user ids as status/control messages and does not correctly keep track of the status of multiple signatures, which allows remote attackers to spoof arbitrary email signatures via p
|16-05-2019 - 18:29||13-06-2018 - 23:29|
An issue was discovered in password-store.sh in pass in Simple Password Store 1.7.x before 1.7.2. The signature verification routine parses the output of GnuPG with an incomplete regular expression, which allows remote attackers to spoof file signatu
|16-05-2019 - 18:29||15-06-2018 - 02:29|
An issue was discovered in Enigmail before 1.9.9. In a variant of CVE-2017-17847, signature spoofing is possible for multipart/related messages because a signed message part can be referenced with a cid: URI but not actually displayed. In other words
|16-05-2019 - 17:29||27-12-2017 - 17:08|