Show filters
38 Total Results
Displaying 1-10 of 38
Sort by:
Attacker Value
Unknown
CVE-2024-53857
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows attackers to trigger resource exhaustion vulnerabilities in rpgp by providing crafted messages. This affects general message parsing and decryption with symmetric keys.
0
Attacker Value
Unknown
CVE-2024-53856
Disclosure Date: December 05, 2024 (last updated December 21, 2024)
rPGP is a pure Rust implementation of OpenPGP. Prior to 0.14.1, rPGP allows an attacker to trigger rpgp crashes by providing crafted data. This vulnerability is fixed in 0.14.1.
0
Attacker Value
Unknown
CVE-2024-45624
Disclosure Date: September 12, 2024 (last updated September 12, 2024)
Exposure of sensitive information due to incompatible policies issue exists in Pgpool-II. If a database user accesses a query cache, table data unauthorized for the user may be retrieved.
0
Attacker Value
Unknown
CVE-2023-41037
Disclosure Date: August 29, 2023 (last updated October 08, 2023)
OpenPGP.js is a JavaScript implementation of the OpenPGP protocol. In affected versions OpenPGP Cleartext Signed Messages are cryptographically signed messages where the signed text is readable without special tools. These messages typically contain a "Hash: ..." header declaring the hash algorithm used to compute the signature digest. OpenPGP.js up to v5.9.0 ignored any data preceding the "Hash: ..." texts when verifying the signature. As a result, malicious parties could add arbitrary text to a third-party Cleartext Signed Message, to lead the victim to believe that the arbitrary text was signed. A user or application is vulnerable to said attack vector if it verifies the CleartextMessage by only checking the returned `verified` property, discarding the associated `data` information, and instead _visually trusting_ the contents of the original message. Since `verificationResult.data` would always contain the actual signed data, users and apps that check this information are not vuln…
0
Attacker Value
Unknown
CVE-2023-22332
Disclosure Date: January 30, 2023 (last updated October 08, 2023)
Information disclosure vulnerability exists in Pgpool-II 4.4.0 to 4.4.1 (4.4 series), 4.3.0 to 4.3.4 (4.3 series), 4.2.0 to 4.2.11 (4.2 series), 4.1.0 to 4.1.14 (4.1 series), 4.0.0 to 4.0.21 (4.0 series), All versions of 3.7 series, All versions of 3.6 series, All versions of 3.5 series, All versions of 3.4 series, and All versions of 3.3 series. A specific database user's authentication information may be obtained by another database user. As a result, the information stored in the database may be altered and/or database may be suspended by a remote attacker who successfully logged in the product with the obtained credentials.
0
Attacker Value
Unknown
CVE-2014-7257
Disclosure Date: December 11, 2019 (last updated November 27, 2024)
SQL injection vulnerability in DBD::PgPP 0.05 and earlier
0
Attacker Value
Unknown
CVE-2019-9154
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to pass off unsigned data as signed.
0
Attacker Value
Unknown
CVE-2019-9153
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to forge signed messages by replacing its signatures with a "standalone" or "timestamp" signature.
0
Attacker Value
Unknown
CVE-2019-9155
Disclosure Date: August 22, 2019 (last updated November 27, 2024)
A cryptographic issue in OpenPGP.js <=4.2.0 allows an attacker who is able provide forged messages and gain feedback about whether decryption of these messages succeeded to conduct an invalid curve attack in order to gain the victim's ECDH private key.
0
Attacker Value
Unknown
CVE-2019-8338
Disclosure Date: May 16, 2019 (last updated November 27, 2024)
The signature verification routine in the Airmail GPG-PGP Plugin, versions 1.0 (9) and earlier, does not verify the status of the signature at all, which allows remote attackers to spoof arbitrary email signatures by crafting a signed email with an invalid signature. Also, it does not verify the validity of the signing key, which allows remote attackers to spoof arbitrary email signatures by crafting a key with a fake user ID (email address) and injecting it into the user's keyring.
0