Vulnerabilities (CVE)

Filtered by vendor Winace Subscribe
Filtered by product Winace
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2007-6563 1 Winace 1 Winace 2024-02-04 10.0 HIGH N/A
Heap-based buffer overflow in WinAce 2.65 and earlier, and possibly other versions before 2.69, allows user-assisted remote attackers to execute arbitrary code via a long filename in a compressed UUE archive.
CVE-2007-1673 9 Amavis, Avast, Avira and 6 more 13 Amavis, Avast Antivirus, Avast Antivirus Home and 10 more 2024-02-04 7.8 HIGH N/A
unzoo.c, as used in multiple products including AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
CVE-2007-2535 1 Winace 1 Winace 2024-02-04 7.8 HIGH N/A
WinAce allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
CVE-2006-0813 1 Winace 1 Winace 2024-02-04 5.1 MEDIUM N/A
Heap-based buffer overflow in WinACE 2.60 allows user-assisted attackers to execute arbitrary code via a large header block in an ARJ archive.
CVE-2005-2856 1 Winace 1 Winace 2024-02-04 7.5 HIGH N/A
Stack-based buffer overflow in the WinACE UNACEV2.DLL third-party compression utility before 2.6.0.0, as used in multiple products including (1) ALZip 5.51 through 6.11, (2) Servant Salamander 2.0 and 2.5 Beta 1, (3) WinHKI 1.66 and 1.67, (4) ExtractNow 3.x, (5) Total Commander 6.53, (6) Anti-Trojan 5.5.421, (7) PowerArchiver before 9.61, (8) UltimateZip 2.7,1, 3.0.3, and 3.1b, (9) Where Is It (WhereIsIt) 3.73.501, (10) FilZip 3.04, (11) IZArc 3.5 beta3, (12) Eazel 1.0, (13) Rising Antivirus 18.27.21 and earlier, (14) AutoMate 6.1.0.0, (15) BitZipper 4.1 SR-1, (16) ZipTV, and other products, allows user-assisted attackers to execute arbitrary code via a long filename in an ACE archive.
CVE-2005-2694 1 Winace 1 Winace 2024-02-04 7.5 HIGH N/A
Buffer overflow in WinAce 2.6.0.5, and possibly earlier versions, allows remote attackers to execute arbitrary code via a temporary (.tmp) file that contains an entry with a long file name.