Количество 18
Количество 18
RLSA-2020:4490
Moderate: gnupg2 security, bug fix, and enhancement update
CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
CVE-2018-1000858
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CS ...
CVE-2019-13050
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
CVE-2019-13050
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
CVE-2019-13050
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
openSUSE-SU-2019:0020-1
Security update for gpg2
SUSE-SU-2019:0023-1
Security update for gpg2
GHSA-44cw-f8qw-mf2h
GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060.
BDU:2020-01716
Уязвимость перекрестного запроса «CSRF» программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), позволяющая нарушителю совершить атаку типа отказ в обслуживании
openSUSE-SU-2019:1917-1
Security update for gpg2
SUSE-SU-2019:2480-1
Security update for gpg2
SUSE-SU-2019:2006-1
Security update for gpg2
GHSA-ch5h-mpfr-fhxh
Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack.
ELSA-2020-4490
ELSA-2020-4490: gnupg2 security, bug fix, and enhancement update (MODERATE)
BDU:2019-02942
Уязвимость сетевого программного средства SKS Keyserver и программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), связанная с отсутствием проверки хостовых данных сертификата, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2020:4490 Moderate: gnupg2 security, bug fix, and enhancement update | больше 5 лет назад | |||
CVE-2018-1000858 GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. | CVSS3: 8.8 | 0% Низкий | около 7 лет назад | |
CVE-2018-1000858 GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. | CVSS3: 5.4 | 0% Низкий | около 7 лет назад | |
CVE-2018-1000858 GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. | CVSS3: 8.8 | 0% Низкий | около 7 лет назад | |
CVE-2018-1000858 GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CS ... | CVSS3: 8.8 | 0% Низкий | около 7 лет назад | |
CVE-2019-13050 Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-13050 Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-13050 Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад | |
openSUSE-SU-2019:0020-1 Security update for gpg2 | 0% Низкий | почти 7 лет назад | ||
SUSE-SU-2019:0023-1 Security update for gpg2 | 0% Низкий | около 7 лет назад | ||
GHSA-44cw-f8qw-mf2h GnuPG version 2.1.12 - 2.2.11 contains a Cross ite Request Forgery (CSRF) vulnerability in dirmngr that can result in Attacker controlled CSRF, Information Disclosure, DoS. This attack appear to be exploitable via Victim must perform a WKD request, e.g. enter an email address in the composer window of Thunderbird/Enigmail. This vulnerability appears to have been fixed in after commit 4a4bb874f63741026bd26264c43bb32b1099f060. | CVSS3: 8.8 | 0% Низкий | больше 3 лет назад | |
BDU:2020-01716 Уязвимость перекрестного запроса «CSRF» программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), позволяющая нарушителю совершить атаку типа отказ в обслуживании | CVSS3: 6.3 | 0% Низкий | около 7 лет назад | |
openSUSE-SU-2019:1917-1 Security update for gpg2 | 1% Низкий | больше 6 лет назад | ||
SUSE-SU-2019:2480-1 Security update for gpg2 | 1% Низкий | больше 6 лет назад | ||
SUSE-SU-2019:2006-1 Security update for gpg2 | 1% Низкий | больше 6 лет назад | ||
GHSA-ch5h-mpfr-fhxh Interaction between the sks-keyserver code through 1.2.0 of the SKS keyserver network, and GnuPG through 2.2.16, makes it risky to have a GnuPG keyserver configuration line referring to a host on the SKS keyserver network. Retrieving data from this network may cause a persistent denial of service, because of a Certificate Spamming Attack. | CVSS3: 7.5 | 1% Низкий | больше 3 лет назад | |
ELSA-2020-4490 ELSA-2020-4490: gnupg2 security, bug fix, and enhancement update (MODERATE) | больше 5 лет назад | |||
BDU:2019-02942 Уязвимость сетевого программного средства SKS Keyserver и программы для шифрования информации и создания электронных цифровых подписей GNU Privacy Guard (GnuPG), связанная с отсутствием проверки хостовых данных сертификата, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад |
Уязвимостей на страницу