6 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

WinZip before 11.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning. WinZip anterior a 11.0 no verifica adecuadamente la autenticidad de las actualizaciones, lo cual permite a atacantes de tipo 'hombre en el medio' (man-in-the-middle) ejecutar código de su elección a través de la actualización de un Caballo de Troya, que se manifiesta en el grado de daño y el envenenamiento de la caché DNS. • http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html http://securitytracker.com/id?1020581 http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf http://www.infobyte.com.ar/down/isr-evilgrade-1.0.0.tar.gz • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 67%CPEs: 7EXPL: 4

Stack-based buffer overflow in the Sky Software FileView ActiveX control, as used in WinZip 10 before build 7245 and in certain other applications, allows remote attackers to execute arbitrary code via a long FilePattern attribute in a WZFILEVIEW object, a different vulnerability than CVE-2006-5198. Desbordamiento de búfer basado en la pila en el control ActiveX Sky Software FileView, como el usado en WinZip 10 anterior a build 7245 y en otras ciertas aplicaciones, permite a atacantes remotos ejecutar código de su elección mediante un atributo FilePattern largo en un objeto WZFILEVIEW, una vulnerabilidad diferente que CVE-2006-5198. • https://www.exploit-db.com/exploits/3420 http://secunia.com/advisories/22891 http://www.kb.cert.org/vuls/id/225217 http://www.securityfocus.com/archive/1/451566/100/0/threaded http://www.securityfocus.com/bid/21060 http://www.securityfocus.com/bid/21108 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 https://www.exploit-db.com/exploits/2785 •

CVSS: 3.7EPSS: 0%CPEs: 5EXPL: 1

Multiple buffer overflows in WinZip 9.0 and earlier may allow attackers to execute arbitrary code via multiple vectors, including the command line. • https://www.exploit-db.com/exploits/1034 http://marc.info/?l=bugtraq&m=109416099301369&w=2 http://securitytracker.com/id?1011132 http://www.ciac.org/ciac/bulletins/o-211.shtml http://www.securityfocus.com/bid/11092 http://www.winzip.com/wz90sr1.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/17192 https://exchange.xforce.ibmcloud.com/vulnerabilities/17197 •

CVSS: 10.0EPSS: 37%CPEs: 11EXPL: 2

Buffer overflow in the UUDeview package, as used in WinZip 6.2 through WinZip 8.1 SR-1, and possibly other packages, allows remote attackers to execute arbitrary code via a MIME archive with certain long MIME parameters. • https://www.exploit-db.com/exploits/272 http://secunia.com/advisories/10995 http://secunia.com/advisories/11019 http://www.ciac.org/ciac/bulletins/o-092.shtml http://www.idefense.com/application/poi/display?id=76&type=vulnerabiliti&flashstatus=true http://www.kb.cert.org/vuls/id/116182 http://www.openpkg.org/security/OpenPKG-SA-2004.006-uudeview.html http://www.osvdb.org/4119 http://www.securityfocus.com/bid/9758 http://www.winzip.com/fmwz90.htm https://exchang •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

WinZip 8.0 uses weak random number generation for password protected ZIP files, which allows local users to brute force the encryption keys and extract the data from the zip file by guessing the state of the stream coder. • http://securityreason.com/securityalert/3265 http://www.securityfocus.com/archive/1/311059 http://www.securityfocus.com/bid/6805 https://exchange.xforce.ibmcloud.com/vulnerabilities/11296 • CWE-255: Credentials Management Errors •