Page 2 of 24 results (0.005 seconds)

CVSS: 9.8EPSS: 3%CPEs: 1EXPL: 0

04 Oct 2002 — Buffer overflow in PGP Corporate Desktop 7.1.1 allows remote attackers to execute arbitrary code via an encrypted document that has a long filename when it is decrypted. Desbordamiento de búfer en PGP Corporate Desktop 7.1.1 permite a atacantes remotos ejecutar código arbitrario mediante un documento cifrado que tiene un nombre de archivo largo cuando es descifrado • http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0106.html •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

12 Aug 2002 — An interaction between PGP 7.0.3 with the "wipe deleted files" option, when used on Windows Encrypted File System (EFS), creates a cleartext temporary files that cannot be wiped or deleted due to strong permissions, which could allow certain local users or attackers with physical access to obtain cleartext information. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0052.html • CWE-459: Incomplete Cleanup •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

23 Jul 2002 — Heap-based buffer overflow in the message decoding functionality for PGP Outlook Encryption Plug-In, as used in NAI PGP Desktop Security 7.0.4, Personal Security 7.0.3, and Freeware 7.0.3, allows remote attackers to modify the heap and gain privileges via a large, malformed mail message. Desbordamiento de búfer en el plug-in de cifrado PGP para Outlook, usado en NAI PGP Destokp Security 7.0.4, Personal Security 7.0.3 y Freeware 7.0.3 (Utilidades Norton), permite a atacantes remotos modificar el montón (heap... • http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.04/hotfix/ReadMe.txt •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

28 Sep 2001 — Network Associates PGP Keyserver 7.0 allows remote attackers to bypass authentication and access the administrative web interface via URLs that directly access cgi-bin instead of keyserver/cgi-bin for the programs (1) console, (2) cs, (3) multi_config and (4) directory. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0230.html •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

04 Sep 2001 — PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability." • http://www.osvdb.org/1946 •

CVSS: 9.8EPSS: 9%CPEs: 15EXPL: 0

04 Sep 2001 — Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. • ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 66%CPEs: 1EXPL: 1

16 Jul 2001 — Network Associates PGP Keyserver 7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via exceptional BER encodings (possibly buffer overflows), as demonstrated by the PROTOS LDAPv3 test suite. • https://www.exploit-db.com/exploits/16823 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

18 Jun 2001 — ASCII Armor parser in Windows PGP 7.0.3 and earlier allows attackers to create files in arbitrary locations via a malformed ASCII armored file. • https://www.exploit-db.com/exploits/20738 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

24 May 2001 — The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-017.0.txt •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

24 May 2001 — The split key mechanism used by PGP 7.0 allows a key share holder to obtain access to the entire key by setting the "Cache passphrase while logged on" option and capturing the passphrases of other share holders as they authenticate. • http://marc.info/?l=bugtraq&m=98691775527457&w=2 •