Loading...
Loading...
GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
October 10, 2013
April 29, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2013-4351
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.