Описание
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
Ссылки
- ExploitMailing ListThird Party Advisory
- Issue TrackingMailing ListPatchThird Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- Issue TrackingMailing ListPatchThird Party Advisory
- Issue TrackingPatchVendor Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
EPSS
6.5 Medium
CVSS3
5.8 Medium
CVSS2
Дефекты
Связанные уязвимости
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
GnuPG through 2.3.6, in unusual situations where an attacker possesses ...
EPSS
6.5 Medium
CVSS3
5.8 Medium
CVSS2