![]() User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. ![]() This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. Other service functions, such as encryption, archive comments, error logging, etc.August 17th, 2023 RARLAB WinRAR Recovery Volume Improper Validation of Array Index Remote Code Execution Vulnerability ZDI-23-1152ħ.8, (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).Recovery volumes allowing to reconstruct missing parts of multivolume archives. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |