Логотип exploitDog
bind:CVE-2023-40477
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-40477

Количество 7

Количество 7

ubuntu логотип

CVE-2023-40477

почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

CVSS3: 7.8
EPSS: Критический
nvd логотип

CVE-2023-40477

почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

CVSS3: 7.8
EPSS: Критический
debian логотип

CVE-2023-40477

почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remot ...

CVSS3: 7.8
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2023:4415-1

около 2 лет назад

Security update for clamav

EPSS: Критический
suse-cvrf логотип

SUSE-SU-2023:4297-1

больше 2 лет назад

Security update for clamav

EPSS: Критический
github логотип

GHSA-58vr-f4x9-3h36

почти 2 года назад

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

CVSS3: 7.8
EPSS: Критический
fstec логотип

BDU:2023-04819

больше 2 лет назад

Уязвимость системы обработки восстановления томов RAR4 файлового архиватора WinRAR, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-40477

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

CVSS3: 7.8
93%
Критический
почти 2 года назад
nvd логотип
CVE-2023-40477

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

CVSS3: 7.8
93%
Критический
почти 2 года назад
debian логотип
CVE-2023-40477

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remot ...

CVSS3: 7.8
93%
Критический
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4415-1

Security update for clamav

93%
Критический
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:4297-1

Security update for clamav

93%
Критический
больше 2 лет назад
github логотип
GHSA-58vr-f4x9-3h36

RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of recovery volumes. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21233.

CVSS3: 7.8
93%
Критический
почти 2 года назад
fstec логотип
BDU:2023-04819

Уязвимость системы обработки восстановления томов RAR4 файлового архиватора WinRAR, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
93%
Критический
больше 2 лет назад

Уязвимостей на страницу