The host is installed with WinRAR through 5.61 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle the crafting of the filename field of the ACE format. Successful exploitation allows attacker to create empty files and folders everywhere in the file system.
The host is installed with WinRAR through 5.60 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle the parsing of crafted ACE and RAR archive formats. Successful exploitation allows attackers to perform arbitrary code execution in the context of the current user.
The host is installed with WinRAR through 5.61 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to properly handle the crafting of the filename field of the ACE format (in UNACEV2.dll). Successful exploitation allows attackers to manipulate the filename field with specific patterns and ignore the destination (extraction) folder, thus treating the fi ...
The host is installed with WinRAR through 5.60 and is prone to an out-of-bounds write vulnerability. A flaw is present in the application, which fails to properly handle the parsing of a crafted LHA / LZH archive formats. Successful exploitation allows attackers to perform arbitrary code execution in the context of the current user.
The host is installed with WinRAR before 5.30.0 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to handle a trojan horse file. Successful exploitation allows local users to gain privileges.
The host is installed with WinRAR before 3.71 and is prone to multiple unspecified vulnerabilities. The flaws are present in the application, which fails to handle crafted ACE, ARJ, BZ2, CAB, GZ, LHA, RAR, TAR or ZIP files. Successful exploitation have unknown impact and attack vectors.