Vulnerabilities > Gnupg > Medium

DATE CVE VULNERABILITY TITLE RISK
2006-06-19 CVE-2006-3082 Numeric Errors vulnerability in Gnupg
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
network
low complexity
gnupg CWE-189
5.0
2005-05-02 CVE-2005-0366 Inadequate Encryption Strength vulnerability in Gnupg
The integrity check feature in OpenPGP, when handling a message that was encrypted using cipher feedback (CFB) mode, allows remote attackers to recover part of the plaintext via a chosen-ciphertext attack when the first 2 bytes of a message block are known, and an oracle or other mechanism is available to determine whether an integrity check failed.
network
low complexity
gnupg CWE-326
5.0