Known Vulnerabilities for Privacy Guard by Gnu

Listed below are 10 of the newest known vulnerabilities associated with "Privacy Guard" by "Gnu".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2006-6235 A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows attacker... 10 - HIGH 2006-12-07 2018-10-17
CVE-2006-0455 gpgv in GnuPG before 1.4.2.1, when using unattended signature verification, returns a 0 exit code in certain cases even when ... 4.6 - MEDIUM 2006-02-15 2023-11-07
CVE-2006-0049 gpg in GnuPG before 1.4.2.2 does not properly verify non-detached signatures, which allows attackers to inject unsigned data ... 5 - MEDIUM 2006-03-13 2018-10-19
CVE-2003-0978 Format string vulnerability in gpgkeys_hkp (experimental HKP interface) for the GnuPG (gpg) client 1.2.3 and earlier, and 1.3... 7.5 - HIGH 2004-01-05 2017-07-11
CVE-2003-0971 GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component f... 5 - MEDIUM 2003-12-15 2017-10-11
CVE-2003-0255 The key validation code in GnuPG before 1.2.2 does not properly determine the validity of keys with multiple user IDs and ass... 10 - HIGH 2003-05-27 2018-05-03
CVE-2001-0522 Format string vulnerability in Gnu Privacy Guard (aka GnuPG or gpg) 1.05 and earlier can allow an attacker to gain privileges... 7.5 - HIGH 2001-08-14 2018-05-03
CVE-2001-0072 gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the u... 5 - MEDIUM 2001-02-12 2017-10-10
CVE-2001-0071 gpg (aka GnuPG) 1.0.4 and other versions does not properly verify detached signatures, which allows attackers to modify the c... 2.1 - LOW 2001-02-12 2017-10-10
CVE-2000-0974 GnuPG (gpg) 1.0.3 does not properly check all signatures of a file containing multiple documents, which allows an attacker to... 7.5 - HIGH 2000-12-19 2018-05-03

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationGnuPrivacy Guard8.0AllAllAll
ApplicationGnuPrivacy Guard7.2AllAllAll
ApplicationGnuPrivacy Guard7.1AllAllAll
ApplicationGnuPrivacy Guard2.0.1AllAllAll
ApplicationGnuPrivacy Guard2.0AllAllAll
ApplicationGnuPrivacy Guard1.9.20AllAllAll
ApplicationGnuPrivacy Guard1.9.15AllAllAll
ApplicationGnuPrivacy Guard1.9.10AllAllAll
ApplicationGnuPrivacy Guard1.4.5AllAllAll
ApplicationGnuPrivacy Guard1.4.4AllAllAll
ApplicationGnuPrivacy Guard1.4.3AllAllAll
ApplicationGnuPrivacy Guard1.4.2.2AllAllAll
ApplicationGnuPrivacy Guard1.4.2.1AllAllAll
ApplicationGnuPrivacy Guard1.4.2AllAllAll
ApplicationGnuPrivacy Guard1.4.1AllAllAll
ApplicationGnuPrivacy Guard1.4AllAllAll
ApplicationGnuPrivacy Guard1.3.4AllAllAll
ApplicationGnuPrivacy Guard1.3.3AllAllAll
ApplicationGnuPrivacy Guard1.2.7AllAllAll
ApplicationGnuPrivacy Guard1.2.6AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report