CVE-2002-0850
https://notcve.org/view.php?id=CVE-2002-0850
Buffer overflow in PGP Corporate Desktop 7.1.1 allows remote attackers to execute arbitrary code via an encrypted document that has a long filename when it is decrypted. Desbordamiento de búfer en PGP Corporate Desktop 7.1.1 permite a atacantes remotos ejecutar código arbitrario mediante un documento cifrado que tiene un nombre de archivo largo cuando es descifrado • http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0106.html http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.1.1/pgphotfix_outlookplugin711/ReadMe.txt http://marc.info/?l=bugtraq&m=103133995920090&w=2 http://www.securityfocus.com/bid/5656 https://exchange.xforce.ibmcloud.com/vulnerabilities/10043 •
CVE-2002-0788
https://notcve.org/view.php?id=CVE-2002-0788
An interaction between PGP 7.0.3 with the "wipe deleted files" option, when used on Windows Encrypted File System (EFS), creates a cleartext temporary files that cannot be wiped or deleted due to strong permissions, which could allow certain local users or attackers with physical access to obtain cleartext information. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0052.html http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.1/hotfix/ReadMe.txt http://www.iss.net/security_center/static/9044.php http://www.osvdb.org/4363 http://www.securityfocus.com/bid/4702 • CWE-459: Incomplete Cleanup •
CVE-2002-0685
https://notcve.org/view.php?id=CVE-2002-0685
Heap-based buffer overflow in the message decoding functionality for PGP Outlook Encryption Plug-In, as used in NAI PGP Desktop Security 7.0.4, Personal Security 7.0.3, and Freeware 7.0.3, allows remote attackers to modify the heap and gain privileges via a large, malformed mail message. Desbordamiento de búfer en el plug-in de cifrado PGP para Outlook, usado en NAI PGP Destokp Security 7.0.4, Personal Security 7.0.3 y Freeware 7.0.3 (Utilidades Norton), permite a atacantes remotos modificar el montón (heap) y ganar privilegios mediante un mensaje de correo electrónico grande y malformado. • http://download.nai.com/products/licensed/pgp/desktop_security/windows/version_7.04/hotfix/ReadMe.txt http://marc.info/?l=bugtraq&m=102634756815773&w=2 http://marc.info/?l=ntbugtraq&m=102639521518942&w=2 http://www.iss.net/security_center/static/9525.php http://www.kb.cert.org/vuls/id/821139 http://www.osvdb.org/4364 http://www.securityfocus.com/bid/5202 •
CVE-2001-1252
https://notcve.org/view.php?id=CVE-2001-1252
Network Associates PGP Keyserver 7.0 allows remote attackers to bypass authentication and access the administrative web interface via URLs that directly access cgi-bin instead of keyserver/cgi-bin for the programs (1) console, (2) cs, (3) multi_config and (4) directory. • http://archives.neohapsis.com/archives/bugtraq/2001-09/0230.html http://www.iss.net/security_center/static/7203.php http://www.osvdb.org/1955 http://www.osvdb.org/4193 http://www.pgp.com/support/product-advisories/keyserver.asp http://www.securityfocus.com/bid/3375 •
CVE-2001-1016
https://notcve.org/view.php?id=CVE-2001-1016
PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability." • http://www.osvdb.org/1946 http://www.pgp.com/support/product-advisories/pgpsdk.asp http://www.securityfocus.com/archive/1/211806 http://www.securityfocus.com/bid/3280 https://exchange.xforce.ibmcloud.com/vulnerabilities/7081 •