Vulnerabilities > GNU > Privacy Guard > 1.2.1

DATE CVE VULNERABILITY TITLE RISK
2006-03-13 CVE-2006-0049 Unspecified vulnerability in GNU Privacy Guard
gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data via a data packet that is not associated with a control packet, which causes the check for concatenated signatures to report that the signature is valid, a different vulnerability than CVE-2006-0455.
network
low complexity
gnu
5.0
2004-01-05 CVE-2003-0978 Unspecified vulnerability in GNU Privacy Guard
Format string vulnerability in gpgkeys_hkp (experimental HKP interface) for the GnuPG (gpg) client 1.2.3 and earlier, and 1.3.3 and earlier, allows remote attackers or a malicious keyserver to cause a denial of service (crash) and possibly execute arbitrary code during key retrieval.
network
low complexity
gnu
7.5
2003-12-15 CVE-2003-0971 Unspecified vulnerability in GNU Privacy Guard
GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.
network
low complexity
gnu
5.0
2003-05-27 CVE-2003-0255 Unspecified vulnerability in GNU Privacy Guard
The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and assigns the greatest validity of the most valid user ID, which prevents GnuPG from warning the encrypting user when a user ID does not have a trusted path.
network
low complexity
gnu
critical
10.0