Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mx49-25fh-66c8

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

Ссылки

EPSS

Процентиль: 95%
0.17694
Средний

Связанные уязвимости

ubuntu
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

redhat
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

nvd
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the command line, does not visually distinguish signed and unsigned portions of OpenPGP messages with multiple components, which might allow remote attackers to forge the contents of a message without detection.

debian
больше 18 лет назад

GnuPG 1.4.6 and earlier and GPGME before 1.1.4, when run from the comm ...

oracle-oval
почти 18 лет назад

ELSA-2007-0107: Important: gnupg security update (IMPORTANT)

EPSS

Процентиль: 95%
0.17694
Средний