Количество 7
Количество 7
GHSA-2fch-jvg5-crf6
Improper Input Validation python-gnupg

CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.

CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.

CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg t ...

openSUSE-SU-2019:0143-1
Security update for python-python-gnupg

BDU:2019-00692
Уязвимость пакета для шифрования информации Python-gnupg, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-2fch-jvg5-crf6 Improper Input Validation python-gnupg | CVSS3: 7.5 | 22% Средний | больше 6 лет назад | |
![]() | CVE-2019-6690 python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component. | CVSS3: 7.5 | 22% Средний | больше 6 лет назад |
![]() | CVE-2019-6690 python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component. | CVSS3: 7.5 | 22% Средний | больше 6 лет назад |
![]() | CVE-2019-6690 python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component. | CVSS3: 7.5 | 22% Средний | больше 6 лет назад |
CVE-2019-6690 python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg t ... | CVSS3: 7.5 | 22% Средний | больше 6 лет назад | |
![]() | openSUSE-SU-2019:0143-1 Security update for python-python-gnupg | 22% Средний | больше 6 лет назад | |
![]() | BDU:2019-00692 Уязвимость пакета для шифрования информации Python-gnupg, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.1 | 22% Средний | больше 6 лет назад |
Уязвимостей на страницу