<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[unacev2.dll - App-Request]]></title><description><![CDATA[<p dir="auto">There is a vulnerability  in the old version of unacev2.dll:<br />
Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) | McAfee Blogs<br />
<a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250/" rel="nofollow ugc">https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250/</a></p>
<p dir="auto">0patch Blog: No Source Code For a 14-Year Old Vulnerable DLL? No Problem. (CVE-2018-20250)<br />
<a href="https://blog.0patch.com/2019/02/no-source-code-for-14-year-old.html" rel="nofollow ugc">https://blog.0patch.com/2019/02/no-source-code-for-14-year-old.html</a></p>
<p dir="auto">Total Commander offers a download for the fixed version:</p>
<p dir="auto">Total Commander - Mailing<br />
<a href="https://www.ghisler.com/mailing.htm" rel="nofollow ugc">https://www.ghisler.com/mailing.htm</a></p>
<p dir="auto"><a href="https://www.totalcommander.ch/win/unacev2_fixed.zip" rel="nofollow ugc">https://www.totalcommander.ch/win/unacev2_fixed.zip</a></p>
<pre><code>File name and path:     C:\prg\unacev2_fixed\UNACEV2.DLL
Product Name:           UNACE - freeware ACE extraction component
Internal Name:          UnAceV2.Dll
Original Filename:      UnAceV2.Dll

File Description:       UNACE Dynamic Link Library
Company:                ACE Compression Software
Legal Copyright:        ACE Compression Software, 2000-2019
Legal Trademarks:       ACE Compression Software, 2000-2019
Comments:               

File Version String:    2.6.2.0
File Version:           2.6.2.0
Product Version String: 2.6.2.0
Product Version:        2.6.1.0
</code></pre>
<p dir="auto">This is the version with vulnerability:</p>
<pre><code>File name and path:     C:\totalcmd\UNACEV2.DLL
Product Name:           UNACE - freeware ACE extraction component
Internal Name:          UnAceV2.Dll
Original Filename:      UnAceV2.Dll

File Description:       UNACE Dynamic Link Library
Company:                ACE Compression Software
Legal Copyright:        ACE Compression Software, 2000-2005
Legal Trademarks:       ACE Compression Software, 2000-2005
Comments:               

File Version String:    2.6.0.0
File Version:           2.6.0.0
Product Version String: 2.6.0.0
Product Version:        2.6.0.0
</code></pre>
]]></description><link>https://vulndetect.org/topic/642/unacev2-dll-app-request</link><generator>RSS for Node</generator><lastBuildDate>Fri, 06 Mar 2026 15:05:36 GMT</lastBuildDate><atom:link href="https://vulndetect.org/topic/642.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 17 Mar 2019 07:18:02 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to unacev2.dll - App-Request on Sun, 17 Mar 2019 10:44:58 GMT]]></title><description><![CDATA[<p dir="auto">This is a very interesting case indeed.</p>
<p dir="auto">While VulnDetect has the capability of detecting libraries, then this is beyond the current scope of VulnDetect.</p>
<p dir="auto">However, due to the fact that this is being actively exploited and I can see that there is a LOT of software, including Avira AntiVir, WinRAR, XnView, PeaZip, Bandizip, SpeedCommander, and tonnes of software I never heard about, that utilizes it and sounds like it could provide attack vectors, I will add it for now.</p>
<p dir="auto">But do not expect us to support libraries in general, anytime soon.</p>
<p dir="auto">Later in the week, when the second iteration of our bundling is going live, then I will let the security state of unacev2.dll affect the state of the parent program.</p>
]]></description><link>https://vulndetect.org/post/2768</link><guid isPermaLink="true">https://vulndetect.org/post/2768</guid><dc:creator><![CDATA[Tom]]></dc:creator><pubDate>Sun, 17 Mar 2019 10:44:58 GMT</pubDate></item></channel></rss>