Filtered by vendor Pgp
Subscribe
Total
23 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2002-2069 | 1 Pgp | 1 Personal Privacy | 2024-11-20 | 5.0 MEDIUM | 7.5 HIGH |
PGP 6.x and 7.x does not clear Windows alternate data streams that are attached to files on NTFS file systems, which allows attackers to recover sensitive information that was supposed to be deleted. | |||||
CVE-2002-1977 | 1 Pgp | 1 Pgp | 2024-11-20 | 2.1 LOW | N/A |
Network Associates PGP 7.0.4 and 7.1 does not time out according to the value set in the "Passphrase Cache" option, which could allow attackers to open encrypted files without providing a passphrase. | |||||
CVE-2002-1696 | 2 Microsoft, Pgp | 2 Outlook, Personal Privacy | 2024-11-20 | 2.1 LOW | 5.5 MEDIUM |
Microsoft Outlook plug-in PGP version 7.0, 7.0.3, and 7.0.4 silently saves a decrypted copy of a message to hard disk when "Automatically decrypt/verify when opening messages" option is checked, "Always use Secure Viewer when decrypting" option is not checked, and the user replies to an encrypted message. | |||||
CVE-2002-0850 | 1 Pgp | 1 Corporate Desktop | 2024-11-20 | 7.5 HIGH | N/A |
Buffer overflow in PGP Corporate Desktop 7.1.1 allows remote attackers to execute arbitrary code via an encrypted document that has a long filename when it is decrypted. | |||||
CVE-2002-0788 | 1 Pgp | 3 Corporate Desktop, Freeware, Personal Security | 2024-11-20 | 2.1 LOW | 5.5 MEDIUM |
An interaction between PGP 7.0.3 with the "wipe deleted files" option, when used on Windows Encrypted File System (EFS), creates a cleartext temporary files that cannot be wiped or deleted due to strong permissions, which could allow certain local users or attackers with physical access to obtain cleartext information. | |||||
CVE-2002-0685 | 1 Pgp | 3 Desktop Security, Freeware, Personal Security | 2024-11-20 | 7.5 HIGH | N/A |
Heap-based buffer overflow in the message decoding functionality for PGP Outlook Encryption Plug-In, as used in NAI PGP Desktop Security 7.0.4, Personal Security 7.0.3, and Freeware 7.0.3, allows remote attackers to modify the heap and gain privileges via a large, malformed mail message. | |||||
CVE-2001-1456 | 4 Mcafee, Network Associates, Pgp and 1 more | 5 Webshield Smtp, Gauntlet Firewall, Mcafee E-ppliance and 2 more | 2024-11-20 | 7.5 HIGH | N/A |
Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. | |||||
CVE-2001-1320 | 1 Pgp | 1 Keyserver | 2024-11-20 | 7.5 HIGH | N/A |
Network Associates PGP Keyserver 7.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via exceptional BER encodings (possibly buffer overflows), as demonstrated by the PROTOS LDAPv3 test suite. | |||||
CVE-2001-1252 | 1 Pgp | 1 Keyserver | 2024-11-20 | 10.0 HIGH | N/A |
Network Associates PGP Keyserver 7.0 allows remote attackers to bypass authentication and access the administrative web interface via URLs that directly access cgi-bin instead of keyserver/cgi-bin for the programs (1) console, (2) cs, (3) multi_config and (4) directory. | |||||
CVE-2001-1016 | 1 Pgp | 5 Corporate Desktop, E-business Server, Freeware and 2 more | 2024-11-20 | 7.5 HIGH | N/A |
PGP Corporate Desktop before 7.1, Personal Security before 7.0.3, Freeware before 7.0.3, and E-Business Server before 7.1 does not properly display when invalid userID's are used to sign a message, which could allow an attacker to make the user believe that the document has been signed by a trusted third party by adding a second, invalid user ID to a key which has already been signed by the third party, aka the "PGPsdk Key Validity Vulnerability." | |||||
CVE-2001-0435 | 1 Pgp | 1 Pgp | 2024-11-20 | 4.6 MEDIUM | N/A |
The split key mechanism used by PGP 7.0 allows a key share holder to obtain access to the entire key by setting the "Cache passphrase while logged on" option and capturing the passphrases of other share holders as they authenticate. | |||||
CVE-2001-0381 | 1 Pgp | 1 Openpgp | 2024-11-20 | 4.6 MEDIUM | N/A |
The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key. | |||||
CVE-2001-0265 | 1 Pgp | 1 Pgp | 2024-11-20 | 2.1 LOW | N/A |
ASCII Armor parser in Windows PGP 7.0.3 and earlier allows attackers to create files in arbitrary locations via a malformed ASCII armored file. | |||||
CVE-2000-0802 | 1 Pgp | 1 Personal Privacy | 2024-11-20 | 3.6 LOW | N/A |
The BAIR program does not properly restrict access to the Internet Explorer Internet options menu, which allows local users to obtain access to the menu by modifying the registry key that starts BAIR. | |||||
CVE-2000-0678 | 1 Pgp | 1 Pgp | 2024-11-20 | 5.0 MEDIUM | N/A |
PGP 5.5.x through 6.5.3 does not properly check if an Additional Decryption Key (ADK) is stored in the signed portion of a public certificate, which allows an attacker who can modify a victim's public certificate to decrypt any data that has been encrypted with the modified certificate. | |||||
CVE-2000-0543 | 1 Pgp | 1 Certificate Server | 2024-11-20 | 5.0 MEDIUM | N/A |
The command port for PGP Certificate Server 2.5.0 and 2.5.1 allows remote attackers to cause a denial of service if their hostname does not have a reverse DNS entry and they connect to port 4000. | |||||
CVE-2000-0445 | 1 Pgp | 1 Pgp | 2024-11-20 | 2.1 LOW | N/A |
The pgpk command in PGP 5.x on Unix systems uses an insufficiently random data source for non-interactive key pair generation, which may produce predictable keys. | |||||
CVE-2010-3618 | 1 Pgp | 2 Desktop For Mac, Desktop For Windows | 2024-02-28 | 4.3 MEDIUM | N/A |
PGP Desktop 10.0.x before 10.0.3 SP2 and 10.1.0 before 10.1.0 SP1 does not properly implement the "Decrypt/Verify File via Right-Click" functionality for multi-packet OpenPGP messages that represent multi-message input, which allows remote attackers to spoof signed data by concatenating an additional message to the end of a legitimately signed message, related to a "piggy-back" or "unsigned data injection" issue. | |||||
CVE-2010-3397 | 1 Pgp | 1 Desktop | 2024-02-28 | 9.3 HIGH | N/A |
Untrusted search path vulnerability in PGP Desktop 9.9.0 Build 397, 9.10.x, 10.0.0 Build 2732, and probably other versions allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tsp.dll or tvttsp.dll that is located in the same folder as a .p12, .pem, .pgp, .prk, .prvkr, .pubkr, .rnd, or .skr file. | |||||
CVE-2008-5731 | 1 Pgp | 1 Desktop | 2024-02-28 | 4.9 MEDIUM | N/A |
The PGPwded device driver (aka PGPwded.sys) in PGP Corporation PGP Desktop 9.0.6 build 6060 and 9.9.0 build 397 allows local users to cause a denial of service (system crash) and possibly gain privileges via a certain METHOD_BUFFERED IOCTL request that overwrites portions of memory, related to a "Driver Collapse." NOTE: some of these details are obtained from third party information. |