Gpg4win 3.1.12

CPE Details

Gpg4win 3.1.12
3.1.12
2020-09-04
13h33 +00:00
2020-09-04
13h33 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:gpg4win:gpg4win:3.1.12:*:*:*:*:*:*:*

Informations

Vendor

gpg4win

Product

gpg4win

Version

3.1.12

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-3515 2023-01-11 23h00 +00:00 A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
9.8
Critical
CVE-2020-25125 2020-09-03 15h48 +00:00 GnuPG 2.2.21 and 2.2.22 (and Gpg4win 3.1.12) has an array overflow, leading to a crash or possibly unspecified other impact, when a victim imports an attacker's OpenPGP key, and this key has AEAD preferences. The overflow is caused by a g10/key-check.c error. NOTE: GnuPG 2.3.x is unaffected. GnuPG 2.2.23 is a fixed version.
7.8
High