Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Gpg4win Subscribe
Filtered by product Gpg4win
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-3515 3 Gnupg, Gpg4win, Libksba Project 4 Gnupg, Vs-desktop, Gpg4win and 1 more 2023-01-20 N/A 9.8 CRITICAL
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
CVE-2020-25125 2 Gnupg, Gpg4win 2 Gnupg, Gpg4win 2020-09-11 6.8 MEDIUM 7.8 HIGH
GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.
CVE-2006-6235 6 Gnu, Gpg4win, Redhat and 3 more 9 Privacy Guard, Gpg4win, Enterprise Linux and 6 more 2018-10-17 10.0 HIGH N/A
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attackers to execute arbitrary code via crafted OpenPGP packets that cause GnuPG to dereference a function pointer from deallocated stack memory.
CVE-2009-3805 2 Gpg4win, Kde-apps 2 Gpg4win, Kleopatra 2017-08-16 4.3 MEDIUM N/A
gpg2.exe in Gpg4win 2.0.1, as used in KDE Kleopatra 2.0.11, allows remote attackers to cause a denial of service (application crash) via a long certificate signature.