Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2022-0530

A flaw was found in Unzip. The vulnerability occurs during the conversion of a wide string to a local string that leads to a heap of out-of-bound write. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 33.1%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 4.3
References
Products affected by CVE-2022-0530
  • Unzip Project » Unzip » Version: 6.0
    cpe:2.3:a:unzip_project:unzip:6.0
  • Apple » Mac Os X » Version: 10.15
    cpe:2.3:o:apple:mac_os_x:10.15
  • Apple » Mac Os X » Version: 10.15.1
    cpe:2.3:o:apple:mac_os_x:10.15.1
  • Apple » Mac Os X » Version: 10.15.2
    cpe:2.3:o:apple:mac_os_x:10.15.2
  • Apple » Mac Os X » Version: 10.15.3
    cpe:2.3:o:apple:mac_os_x:10.15.3
  • Apple » Mac Os X » Version: 10.15.4
    cpe:2.3:o:apple:mac_os_x:10.15.4
  • Apple » Mac Os X » Version: 10.15.5
    cpe:2.3:o:apple:mac_os_x:10.15.5
  • Apple » Mac Os X » Version: 10.15.6
    cpe:2.3:o:apple:mac_os_x:10.15.6
  • Apple » Mac Os X » Version: 10.15.7
    cpe:2.3:o:apple:mac_os_x:10.15.7
  • Apple » Macos » Version: 11.0
    cpe:2.3:o:apple:macos:11.0
  • Apple » Macos » Version: 11.0.1
    cpe:2.3:o:apple:macos:11.0.1
  • Apple » Macos » Version: 11.1
    cpe:2.3:o:apple:macos:11.1
  • Apple » Macos » Version: 11.1.0
    cpe:2.3:o:apple:macos:11.1.0
  • Apple » Macos » Version: 11.2
    cpe:2.3:o:apple:macos:11.2
  • Apple » Macos » Version: 11.2.1
    cpe:2.3:o:apple:macos:11.2.1
  • Apple » Macos » Version: 11.3
    cpe:2.3:o:apple:macos:11.3
  • Apple » Macos » Version: 11.3.1
    cpe:2.3:o:apple:macos:11.3.1
  • Apple » Macos » Version: 11.4
    cpe:2.3:o:apple:macos:11.4
  • Apple » Macos » Version: 11.5
    cpe:2.3:o:apple:macos:11.5
  • Apple » Macos » Version: 11.5.1
    cpe:2.3:o:apple:macos:11.5.1
  • Apple » Macos » Version: 11.6
    cpe:2.3:o:apple:macos:11.6
  • Apple » Macos » Version: 11.6.1
    cpe:2.3:o:apple:macos:11.6.1
  • Apple » Macos » Version: 11.6.2
    cpe:2.3:o:apple:macos:11.6.2
  • Apple » Macos » Version: 11.6.3
    cpe:2.3:o:apple:macos:11.6.3
  • Apple » Macos » Version: 11.6.5
    cpe:2.3:o:apple:macos:11.6.5
  • Apple » Macos » Version: 12.0.0
    cpe:2.3:o:apple:macos:12.0.0
  • Apple » Macos » Version: 12.0.1
    cpe:2.3:o:apple:macos:12.0.1
  • Apple » Macos » Version: 12.1
    cpe:2.3:o:apple:macos:12.1
  • Apple » Macos » Version: 12.2
    cpe:2.3:o:apple:macos:12.2
  • Apple » Macos » Version: 12.2.1
    cpe:2.3:o:apple:macos:12.2.1
  • Apple » Macos » Version: 12.3
    cpe:2.3:o:apple:macos:12.3
  • Apple » Macos » Version: 12.3.1
    cpe:2.3:o:apple:macos:12.3.1
  • Debian » Debian Linux » Version: 10.0
    cpe:2.3:o:debian:debian_linux:10.0
  • Debian » Debian Linux » Version: 11.0
    cpe:2.3:o:debian:debian_linux:11.0
  • Fedoraproject » Fedora » Version: 35
    cpe:2.3:o:fedoraproject:fedora:35
  • Redhat » Enterprise Linux » Version: 8.0
    cpe:2.3:o:redhat:enterprise_linux:8.0


Contact Us

Shodan ® - All rights reserved