7 results (0.003 seconds)

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

01 May 2019 — The signature verification routine in the Airmail GPG-PGP Plugin, versions 1.0 (9) and earlier, does not verify the status of the signature at all, which allows remote attackers to spoof arbitrary email signatures by crafting a signed email with an invalid signature. Also, it does not verify the validity of the signing key, which allows remote attackers to spoof arbitrary email signatures by crafting a key with a fake user ID (email address) and injecting it into the user's keyring. La rutina de verificació... • https://packetstorm.news/files/id/152703 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2002 — Network Associates PGP 7.0.4 and 7.1 does not time out according to the value set in the "Passphrase Cache" option, which could allow attackers to open encrypted files without providing a passphrase. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0313.html •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

04 Sep 2001 — PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability." • http://www.osvdb.org/1946 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

18 Jun 2001 — ASCII Armor parser in Windows PGP 7.0.3 and earlier allows attackers to create files in arbitrary locations via a malformed ASCII armored file. • https://www.exploit-db.com/exploits/20738 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

24 May 2001 — The split key mechanism used by PGP 7.0 allows a key share holder to obtain access to the entire key by setting the "Cache passphrase while logged on" option and capturing the passphrases of other share holders as they authenticate. • http://marc.info/?l=bugtraq&m=98691775527457&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

13 Oct 2000 — PGP 5.5.x through 6.5.3 does not properly check if an Additional Decryption Key (ADK) is stored in the signed portion of a public certificate, which allows an attacker who can modify a victim's public certificate to decrypt any data that has been encrypted with the modified certificate. • http://www.cert.org/advisories/CA-2000-18.html •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

24 May 2000 — The pgpk command in PGP 5.x on Unix systems uses an insufficiently random data source for non-interactive key pair generation, which may produce predictable keys. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0273.html •