PowerArchiver version 14.02.03 creates files with an insecure encryption method even if the user selects a (secure) AES encryption in the GUI. If a user clicks on the "Encrypt Files" and selects "AES 256-bit" for encryption, the outcoming file will not be AES-encrypted. It will instead use the legacy PKZIP encryption, which uses a broken encryption algorithm.
a48e078a1bd32e704a5fbf11c4d4b61c8d037f81b323e1195c53539b587ab28b
Secunia Security Advisory - A vulnerability has been reported in PowerArchiver Command Line, which can be exploited by malicious people to compromise a user's system.
3dedde04cd30312f500bbf171b39ae2ed12d46658a7ea1b570001518deece9d2
Secunia Security Advisory - A vulnerability has been reported in PowerArchiver, which potentially can be exploited by malicious people to compromise a user's system.
52b70bc9282b00fc669d9e48a3cf188a95f4bf9b22c0381697c61d4a1da5b900
A vulnerability has been found in PowerArchiver version 9.64.02. When exploited, the vulnerability allows execution of arbitrary code when the user opens a malicious ISO file.
da5e65cc8102776bac81f3a6ae4e44c4ea8af05fbe201f50c1c1538e357739c3
Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system.
ddacac977989a01b39bec3ad4b32967698a753375a804564fd8b757fadc43059
An arbitrary code execution vulnerability exists in PowerArchiver version 9.62.03.
be1c7f5acea357664b1372470353015f39b13264a61266b84630702156f1c79c
A vulnerability has been found in PowerArchiver version 9.62.03 that allows for arbitrary code execution.
5be398cc76407912583ce04d6d10e64b66f05d6b129c7068c34e6a5947ce19f0
Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system.
93abf764bb45ec5facfec83c903c71363b263e6180c9ee7dfa039ad56bcfcae2
Secunia Security Advisory - Secunia Research has discovered a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system.
eb0bb6ec9c77a30c23092b77b6771fb729f0c0c5979247096fe1c631e31e8c32
Secunia Research has discovered a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when reading the filename of a compressed file from an ACE/ARJ archive. This can be exploited to cause a stack-based buffer overflow when a malicious archive containing a file with an overly long filename is opened. Successful exploitation allows arbitrary code execution. Versions affected: PowerArchiver 2006 version 9.5 Beta 4/Beta 5, PowerArchiver 2004 version 9.25, PowerArchiver 2003 version 8.60, PowerArchiver 2002 version 8.10.
d91f317dc4dfa469154642413a7d8614b4d771da4b5bc132088b13598dfad62d
Secunia Security Advisory - Secunia Research has discovered a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system.
32967ac293fb4e10b11ee4bd97e6f40ac54e49efdd282623099ceeeeb3c168b5