OpenPGP Signature Spoofing in GNOME Evolution by The GNOME Project
CVE-2018-15587
6.5MEDIUM
What is CVE-2018-15587?
GNOME Evolution up to version 3.28.2 is vulnerable to manipulation of OpenPGP signatures, allowing attackers to spoof messages from legitimate entities. This is done through crafted emails that include a valid signature as an attachment. As a result, users may be deceived into believing that these fraudulent messages originate from trusted sources, exposing them to potential phishing attacks and security breaches.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved