Metrics
Affected Vendors & Products
Tue, 09 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
ssvc
|
Tue, 09 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 25 Jun 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Rarlab Rarlab winrar |
|
| CPEs | cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Rarlab Rarlab winrar |
Mon, 23 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Jun 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198. | |
| Title | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: zdi
Published: 2025-06-21T00:09:02.884Z
Updated: 2025-12-10T04:57:13.925Z
Reserved: 2025-06-17T21:51:12.763Z
Link: CVE-2025-6218
Updated: 2025-06-23T20:14:22.300Z
Status : Modified
Published: 2025-06-21T01:15:29.123
Modified: 2025-12-09T19:15:50.590
Link: CVE-2025-6218
No data.