RARLAB WinRAR 7.11

CPE Details

RARLAB WinRAR 7.11
7.11
2025-06-23
11h23 +00:00
2025-06-23
11h23 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:rarlab:winrar:7.11:-:*:*:*:*:*:*

Informations

Vendor

rarlab

Product

winrar

Version

7.11

Update

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2025-8088 2025-08-08 11h11 +00:00 A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.
8.4
Haute
CVE-2025-6218 2025-06-21 00h09 +00:00 RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.
7.8
Haute