Vulnerabilities > Winzip > Winzip > 8.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-08-01 | CVE-2008-3442 | Code Injection vulnerability in Winzip WinZip before 11.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning. | 7.5 |
2006-11-21 | CVE-2006-3890 | Remote Code Execution vulnerability in WinZip WZFileView.FileViewCtrl.61 ActiveX Control Stack-based buffer overflow in the Sky Software FileView ActiveX control, as used in WinZip 10 before build 7245 and in certain other applications, allows remote attackers to execute arbitrary code via a long FilePattern attribute in a WZFILEVIEW object, a different vulnerability than CVE-2006-5198. | 9.3 |
2004-12-31 | CVE-2004-1465 | Buffer Overflow vulnerability in WinZip Multiple buffer overflows in WinZip 9.0 and earlier may allow attackers to execute arbitrary code via multiple vectors, including the command line. | 3.7 |
2004-11-23 | CVE-2004-0333 | Buffer Overrun vulnerability in UUDeview MIME Archive Buffer overflow in the UUDeview package, as used in WinZip 6.2 through WinZip 8.1 SR-1, and possibly other packages, allows remote attackers to execute arbitrary code via a MIME archive with certain long MIME parameters. | 10.0 |
2003-12-31 | CVE-2003-1376 | Credentials Management vulnerability in Winzip 8.0 WinZip 8.0 uses weak random number generation for password protected ZIP files, which allows local users to brute force the encryption keys and extract the data from the zip file by guessing the state of the stream coder. | 4.6 |
2001-06-27 | CVE-2001-0449 | Local Security vulnerability in Winzip 8.0 Buffer overflow in WinZip 8.0 allows attackers to execute arbitrary commands via a long file name that is processed by the /zipandemail command line option. | 4.6 |