Количество 7
Количество 7
CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component.
CVE-2019-6690
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg t ...
openSUSE-SU-2019:0143-1
Security update for python-python-gnupg
GHSA-2fch-jvg5-crf6
Improper Input Validation python-gnupg
BDU:2019-00692
Уязвимость пакета для шифрования информации Python-gnupg, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-6690 python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component. | CVSS3: 7.5 | 22% Средний | почти 7 лет назад | |
CVE-2019-6690 python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component. | CVSS3: 7.5 | 22% Средний | около 7 лет назад | |
CVE-2019-6690 python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a "CWE-20: Improper Input Validation" issue affecting the affect functionality component. | CVSS3: 7.5 | 22% Средний | почти 7 лет назад | |
CVE-2019-6690 python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg t ... | CVSS3: 7.5 | 22% Средний | почти 7 лет назад | |
openSUSE-SU-2019:0143-1 Security update for python-python-gnupg | 22% Средний | почти 7 лет назад | ||
GHSA-2fch-jvg5-crf6 Improper Input Validation python-gnupg | CVSS3: 7.5 | 22% Средний | почти 7 лет назад | |
BDU:2019-00692 Уязвимость пакета для шифрования информации Python-gnupg, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.1 | 22% Средний | около 7 лет назад |
Уязвимостей на страницу