Show filters
41 Total Results
Displaying 1-10 of 41
Sort by:
Attacker Value
Unknown
CVE-2024-53857
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows attackers to trigger resource exhaustion vulnerabilities in rpgp by providing crafted messages. This affects general message parsing and decryption with symmetric keys.
0
Attacker Value
Unknown
CVE-2024-53856
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows an attacker to trigger rpgp crashes by providing crafted data. This vulnerability is fixed in 0.14.1.
0
Attacker Value
Unknown
CVE-2024-45624
Disclosure Date: September 12, 2024 (last updated September 12, 2024)
Exposure of sensitive information due to incompatible policies issue exists in Pgpool-II. If a database user accesses a query cache, table data unauthorized for the user may be retrieved.
0
Attacker Value
Unknown
CVE-2024-3919
Disclosure Date: July 13, 2024 (last updated July 13, 2024)
The OpenPGP Form Encryption for WordPress plugin before 1.5.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
0
Attacker Value
Unknown
CVE-2023-41037
Disclosure Date: August 29, 2023 (last updated October 08, 2023)
OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In affected versions OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools. These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest. OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed. A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message. Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vuln…
0
Attacker Value
Unknown
CVE-2023-22332
Disclosure Date: January 30, 2023 (last updated October 08, 2023)
Information disclosure vulnerability exists in Pgpool-II 4.4.0 to 4.4.1 (4.4 series), 4.3.0 to 4.3.4 (4.3 series), 4.2.0 to 4.2.11 (4.2 series), 4.1.0 to 4.1.14 (4.1 series), 4.0.0 to 4.0.21 (4.0 series), All versions of 3.7 series, All versions of 3.6 series, All versions of 3.5 series, All versions of 3.4 series, and All versions of 3.3 series. A specific database user's authentication information may be obtained by another database user. As a result, the information stored in the database may be altered and/or database may be suspended by a remote attacker who successfully logged in the product with the obtained credentials.
0
Attacker Value
Unknown
CVE-2015-3298
Disclosure Date: March 30, 2022 (last updated February 23, 2025)
Yubico ykneo-openpgp before 1.0.10 has a typo in which an invalid PIN can be used. When first powered up, a signature will be issued even though the PIN has not been validated.
0
Attacker Value
Unknown
CVE-2020-26814
Disclosure Date: November 10, 2020 (last updated November 28, 2024)
SAP Process Integration (PGP Module - Business-to-Business Add On), version - 1.0, allows an attacker to read PGP Keys under certain conditions in the PGP Module of Business-to-Business Add-On, these keys can then be used to read messages processed by the module leading to Information Disclosure.
0
Attacker Value
Unknown
CVE-2014-7257
Disclosure Date: December 11, 2019 (last updated November 27, 2024)
SQL injection vulnerability in DBD::PgPP 0.05 and earlier
0
Attacker Value
Unknown
CVE-2019-9154
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to pass off unsigned data as signed.
0