WinZip 10.0

CPE Details

WinZip 10.0
10.0
2007-08-23
19h16 +00:00
2009-11-25
17h50 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:winzip:winzip:10.0:*:*:*:*:*:*:*

Informations

Vendor

winzip

Product

winzip

Version

10.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-8811 2024-11-22 21h03 +00:00 WinZip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archive files. When opening an archive that bears the Mark-of-the-Web, WinZip removes the Mark-of-the-Web from the archive file. Following extraction, the extracted files also lack the Mark-of-the-Web. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23983.
7.8
High
CVE-2008-3442 2008-08-01 14h00 +00:00 WinZip before 11.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
7.5
CVE-2006-3890 2006-11-21 21h00 +00:00 Stack-based buffer overflow in the Sky Software FileView ActiveX control, as used in WinZip 10 before build 7245 and in certain other applications, allows remote attackers to execute arbitrary code via a long FilePattern attribute in a WZFILEVIEW object, a different vulnerability than CVE-2006-5198.
9.3
CVE-2006-5198 2006-11-14 20h00 +00:00 The WZFILEVIEW.FileViewCtrl.61 ActiveX control (aka Sky Software "FileView" ActiveX control) for WinZip 10.0 before build 7245 allows remote attackers to execute arbitrary code via unspecified "unsafe methods."
4