Page 2 of 10 results (0.007 seconds)

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 2

The Wipe Free Space utility in PGP Desktop Home 8.0 and Desktop Professional 9.0.3 Build 2932 and earlier does not clear file slack space in the last cluster for the file, which allows local users to access the previous contents of the disk. • http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0349.html http://metasploit.com/research/vulns/pgp_slackspace http://secunia.com/advisories/17827 http://www.osvdb.org/21569 http://www.securityfocus.com/archive/1/419077/100/0/threaded http://www.securityfocus.com/archive/1/419282/100/0/threaded http://www.securityfocus.com/archive/1/419654/100/0/threaded http://www.securityfocus.com/bid/15784 •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

Buffer overflow in PGP Corporate Desktop 7.1.1 allows remote attackers to execute arbitrary code via an encrypted document that has a long filename when it is decrypted. Desbordamiento de búfer en PGP Corporate Desktop 7.1.1 permite a atacantes remotos ejecutar código arbitrario mediante un documento cifrado que tiene un nombre de archivo largo cuando es descifrado • http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0106.html http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.1.1/pgphotfix_outlookplugin711/ReadMe.txt http://marc.info/?l=bugtraq&m=103133995920090&w=2 http://www.securityfocus.com/bid/5656 https://exchange.xforce.ibmcloud.com/vulnerabilities/10043 •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

An interaction between PGP 7.0.3 with the "wipe deleted files" option, when used on Windows Encrypted File System (EFS), creates a cleartext temporary files that cannot be wiped or deleted due to strong permissions, which could allow certain local users or attackers with physical access to obtain cleartext information. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0052.html http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.1/hotfix/ReadMe.txt http://www.iss.net/security_center/static/9044.php http://www.osvdb.org/4363 http://www.securityfocus.com/bid/4702 • CWE-459: Incomplete Cleanup •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Heap-based buffer overflow in the message decoding functionality for PGP Outlook Encryption Plug-In, as used in NAI PGP Desktop Security 7.0.4, Personal Security 7.0.3, and Freeware 7.0.3, allows remote attackers to modify the heap and gain privileges via a large, malformed mail message. Desbordamiento de búfer en el plug-in de cifrado PGP para Outlook, usado en NAI PGP Destokp Security 7.0.4, Personal Security 7.0.3 y Freeware 7.0.3 (Utilidades Norton), permite a atacantes remotos modificar el montón (heap) y ganar privilegios mediante un mensaje de correo electrónico grande y malformado. • http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.04/hotfix/ReadMe.txt http://marc.info/?l=bugtraq&m=102634756815773&w=2 http://marc.info/?l=ntbugtraq&m=102639521518942&w=2 http://www.iss.net/security_center/static/9525.php http://www.kb.cert.org/vuls/id/821139 http://www.osvdb.org/4364 http://www.securityfocus.com/bid/5202 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability." • http://www.osvdb.org/1946 http://www.pgp.com/support/product-advisories/pgpsdk.asp http://www.securityfocus.com/archive/1/211806 http://www.securityfocus.com/bid/3280 https://exchange.xforce.ibmcloud.com/vulnerabilities/7081 •