CVE-2008-3442
https://notcve.org/view.php?id=CVE-2008-3442
WinZip before 11.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning. WinZip anterior a 11.0 no verifica adecuadamente la autenticidad de las actualizaciones, lo cual permite a atacantes de tipo 'hombre en el medio' (man-in-the-middle) ejecutar código de su elección a través de la actualización de un Caballo de Troya, que se manifiesta en el grado de daño y el envenenamiento de la caché DNS. • http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html http://securitytracker.com/id?1020581 http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf http://www.infobyte.com.ar/down/isr-evilgrade-1.0.0.tar.gz • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-3890 – WinZip 10.0.7245 - FileView ActiveX Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-3890
Stack-based buffer overflow in the Sky Software FileView ActiveX control, as used in WinZip 10 before build 7245 and in certain other applications, allows remote attackers to execute arbitrary code via a long FilePattern attribute in a WZFILEVIEW object, a different vulnerability than CVE-2006-5198. Desbordamiento de búfer basado en la pila en el control ActiveX Sky Software FileView, como el usado en WinZip 10 anterior a build 7245 y en otras ciertas aplicaciones, permite a atacantes remotos ejecutar código de su elección mediante un atributo FilePattern largo en un objeto WZFILEVIEW, una vulnerabilidad diferente que CVE-2006-5198. • https://www.exploit-db.com/exploits/3420 http://secunia.com/advisories/22891 http://www.kb.cert.org/vuls/id/225217 http://www.securityfocus.com/archive/1/451566/100/0/threaded http://www.securityfocus.com/bid/21060 http://www.securityfocus.com/bid/21108 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 https://www.exploit-db.com/exploits/2785 •
CVE-2004-1465 – WinZip 8.1 - Command Line Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-1465
Multiple buffer overflows in WinZip 9.0 and earlier may allow attackers to execute arbitrary code via multiple vectors, including the command line. • https://www.exploit-db.com/exploits/1034 http://marc.info/?l=bugtraq&m=109416099301369&w=2 http://securitytracker.com/id?1011132 http://www.ciac.org/ciac/bulletins/o-211.shtml http://www.securityfocus.com/bid/11092 http://www.winzip.com/wz90sr1.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/17192 https://exchange.xforce.ibmcloud.com/vulnerabilities/17197 •
CVE-2004-0333 – WinZip - MIME Parsing Overflow
https://notcve.org/view.php?id=CVE-2004-0333
Buffer overflow in the UUDeview package, as used in WinZip 6.2 through WinZip 8.1 SR-1, and possibly other packages, allows remote attackers to execute arbitrary code via a MIME archive with certain long MIME parameters. • https://www.exploit-db.com/exploits/272 http://secunia.com/advisories/10995 http://secunia.com/advisories/11019 http://www.ciac.org/ciac/bulletins/o-092.shtml http://www.idefense.com/application/poi/display?id=76&type=vulnerabiliti&flashstatus=true http://www.kb.cert.org/vuls/id/116182 http://www.openpkg.org/security/OpenPKG-SA-2004.006-uudeview.html http://www.osvdb.org/4119 http://www.securityfocus.com/bid/9758 http://www.winzip.com/fmwz90.htm https://exchang •