winzip CVE Vulnerabilities & Metrics

Focus on winzip vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About winzip Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with winzip. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total winzip CVEs: 1
Earliest CVE date: 27 Jun 2001, 04:00 UTC
Latest CVE date: 22 Nov 2024, 21:15 UTC

Latest CVE reference: CVE-2024-8811

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical winzip CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.42

Max CVSS: 10.0

Critical CVEs (≥9): 4

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 5
7.0-8.9 2
9.0-10.0 4

CVSS Distribution Chart

Top 5 Highest CVSS winzip CVEs

These are the five CVEs with the highest CVSS scores for winzip, sorted by severity first and recency.

All CVEs for winzip

CVE-2024-8811 winzip vulnerability CVSS: 0 22 Nov 2024, 21:15 UTC

WinZip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of archive files. When opening an archive that bears the Mark-of-the-Web, WinZip removes the Mark-of-the-Web from the archive file. Following extraction, the extracted files also lack the Mark-of-the-Web. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-23983.

CVE-2008-3442 winzip vulnerability CVSS: 7.5 01 Aug 2008, 14:41 UTC

WinZip before 11.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.

CVE-2007-0264 winzip vulnerability CVSS: 6.6 16 Jan 2007, 23:28 UTC

Buffer overflow in Winzip32.exe in WinZip 9.0 allows local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long command line argument. NOTE: this issue may cross privilege boundaries if an application automatically invokes Winzip32.exe for untrusted input filenames, as in the case of a file upload application. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.

CVE-2006-6884 winzip vulnerability CVSS: 9.3 31 Dec 2006, 05:00 UTC

Buffer overflow in the WZFILEVIEW.FileViewCtrl.61 ActiveX control (aka Sky Software "FileView" ActiveX control) for WinZip 10.0 Build 6667 allows remote attackers to execute arbitrary code via a long argument to the CreateNewFolderFromName method, a different vulnerability than CVE-2006-5198.

CVE-2006-3890 winzip vulnerability CVSS: 9.3 21 Nov 2006, 22:07 UTC

Stack-based buffer overflow in the Sky Software FileView ActiveX control, as used in WinZip 10 before build 7245 and in certain other applications, allows remote attackers to execute arbitrary code via a long FilePattern attribute in a WZFILEVIEW object, a different vulnerability than CVE-2006-5198.

CVE-2006-5198 winzip vulnerability CVSS: 4.0 14 Nov 2006, 21:07 UTC

The WZFILEVIEW.FileViewCtrl.61 ActiveX control (aka Sky Software "FileView" ActiveX control) for WinZip 10.0 before build 7245 allows remote attackers to execute arbitrary code via unspecified "unsafe methods."

CVE-2004-1465 winzip vulnerability CVSS: 3.7 31 Dec 2004, 05:00 UTC

Multiple buffer overflows in WinZip 9.0 and earlier may allow attackers to execute arbitrary code via multiple vectors, including the command line.

CVE-2004-0333 winzip vulnerability CVSS: 10.0 23 Nov 2004, 05:00 UTC

Buffer overflow in the UUDeview package, as used in WinZip 6.2 through WinZip 8.1 SR-1, and possibly other packages, allows remote attackers to execute arbitrary code via a MIME archive with certain long MIME parameters.

CVE-2004-0234 winzip vulnerability CVSS: 10.0 18 Aug 2004, 04:00 UTC

Multiple stack-based buffer overflows in the get_header function in header.c for LHA 1.14, as used in products such as Barracuda Spam Firewall, allow remote attackers or local users to execute arbitrary code via long directory or file names in an LHA archive, which triggers the overflow when testing or extracting the archive.

CVE-2004-0235 winzip vulnerability CVSS: 6.4 18 Aug 2004, 04:00 UTC

Multiple directory traversal vulnerabilities in LHA 1.14 allow remote attackers or local users to create arbitrary files via an LHA archive containing filenames with (1) .. sequences or (2) absolute pathnames with double leading slashes ("//absolute/path").

CVE-2003-1376 winzip vulnerability CVSS: 4.6 31 Dec 2003, 05:00 UTC

WinZip 8.0 uses weak random number generation for password protected ZIP files, which allows local users to brute force the encryption keys and extract the data from the zip file by guessing the state of the stream coder.

CVE-2002-0370 winzip vulnerability CVSS: 7.5 10 Oct 2002, 04:00 UTC

Buffer overflow in the ZIP capability for multiple products allows remote attackers to cause a denial of service or execute arbitrary code via ZIP files containing entries with long filenames, including (1) Microsoft Windows 98 with Plus! Pack, (2) Windows XP, (3) Windows ME, (4) Lotus Notes R4 through R6 (pre-gold), (5) Verity KeyView, and (6) Stuffit Expander before 7.0.

CVE-2001-0449 winzip vulnerability CVSS: 4.6 27 Jun 2001, 04:00 UTC

Buffer overflow in WinZip 8.0 allows attackers to execute arbitrary commands via a long file name that is processed by the /zipandemail command line option.