Page 3 of 20 results (0.002 seconds)

CVSS: 9.3EPSS: 15%CPEs: 18EXPL: 2

Stack-based buffer overflow in lzh.fmt in WinRAR 3.00 through 3.60 beta 6 allows remote attackers to execute arbitrary code via a long filename in a LHA archive. Desbordamiento de búfer basado en pila en lzh.fmt en WinRAR 3.00 hasta 3.60 beta 6 permite a atacantes remotos ejecutar código de su elección a través de un nombre de archivo en un archivo LHA. • https://www.exploit-db.com/exploits/28235 http://hustlelabs.com/advisories/04072006_rarlabs.pdf http://secunia.com/advisories/21080 http://www.rarlabs.com/rarnew.htm http://www.securityfocus.com/bid/19043 http://www.vupen.com/english/advisories/2006/2867 https://exchange.xforce.ibmcloud.com/vulnerabilities/27815 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 4

Buffer overflow in WinRAR 3.50 and earlier allows local users to execute arbitrary code via a long command-line argument. NOTE: because this program executes with the privileges of the invoking user, and because remote programs do not normally have the ability to specify a command-line argument for this program, there may not be a typical attack vector for the issue that crosses privilege boundaries. Therefore this may not be a vulnerability. • https://www.exploit-db.com/exploits/1403 https://www.exploit-db.com/exploits/1404 http://www.rarlab.com/rarnew.htm http://www.securityfocus.com/archive/1/420679/100/0/threaded http://www.securityfocus.com/bid/15123 http://www.securityfocus.com/data/vulnerabilities/exploits/0xletzdance.c •

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in the "Add to archive" command in WinRAR 3.51 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by tricking the user into adding a file whose filename contains a non-default code page and non-ANSI characters, as demonstrated using a Chinese filename, possibly due to buffer expansion when using the WideCharToMultiByte API. NOTE: it is not clear whether this problem can be exploited for code execution. If not, then perhaps the user-assisted nature of the attack should exclude the issue from inclusion in CVE. • http://securityreason.com/securityalert/290 http://www.securityfocus.com/archive/1/420006/100/0/threaded http://www.securityfocus.com/bid/15999 •

CVSS: 7.5EPSS: 17%CPEs: 11EXPL: 0

Stack-based buffer overflow in UNACEV2.DLL for RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via an ACE archive containing a file with a long name. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0266.html http://secunia.com/advisories/16973 http://secunia.com/secunia_research/2005-53/advisory http://www.osvdb.org/19915 http://www.rarlabs.com/rarnew.htm http://www.securityfocus.com/bid/15062 •

CVSS: 7.5EPSS: 9%CPEs: 11EXPL: 1

Format string vulnerability in RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename. • https://www.exploit-db.com/exploits/26342 http://secunia.com/advisories/16973 http://secunia.com/secunia_research/2005-53/advisory http://www.rarlabs.com/rarnew.htm http://www.securityfocus.com/bid/15062 •