Vulnerabilities
Vulnerable Software
Gnu:  >> Privacy Guard  >> 1.0.3b  Security Vulnerabilities
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
CVSS Score
5.0
EPSS Score
0.045
Published
2006-03-13
gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when the detached signature file does not carry a signature, which could cause programs that use gpgv to assume that the signature verification has succeeded. Note: this also occurs when running the equivalent command "gpg --verify".
CVSS Score
4.6
EPSS Score
0.022
Published
2006-02-15
GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.
CVSS Score
5.0
EPSS Score
0.013
Published
2003-12-15
gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the contents of a file without detection.
CVSS Score
2.1
EPSS Score
0.001
Published
2001-02-12
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.
CVSS Score
5.0
EPSS Score
0.01
Published
2001-02-12


Contact Us

Shodan ® - All rights reserved