Loading...
Loading...
parse-packet.c in GnuPG (gpg) 1.4.3 and 1.9.20, and earlier versions, allows remote attackers to cause a denial of service (gpg crash) and possibly overwrite memory via a message packet with a large length (long user ID string), which could lead to an integer overflow, as demonstrated using the --no-armor option.
June 19, 2006
April 16, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2006-3082
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.