Report Name: AA25-141A_report.txt report
Generated: 2025-05-26 03:05:39

Vulristics Vulnerability Scores
Basic Vulnerability Scores
Products

Product NamePrevalenceUCHMLAComment
WinRAR0.811WinRAR is a trialware file archiver utility for Windows, developed by Eugene Roshal of win.rar GmbH
Microsoft Outlook0.611Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
Roundcube0.633Roundcube is a web-based IMAP email client


Vulnerability Types

Vulnerability TypeCriticalityUCHMLA
Remote Code Execution1.022
Code Injection0.9711
Elevation of Privilege0.8511
Cross Site Scripting0.811


Vulnerabilities

Urgent (5)

1. Remote Code Execution - WinRAR (CVE-2023-38831) - Urgent [942]

Description: RARLAB WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file. This was exploited in the wild in April through October 2023.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, CISA object, cisa_kev object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:www.group-ib.com, Vulners:PublicExploit:1337DAY-ID-39498, Vulners:PublicExploit:1337DAY-ID-39057, Vulners:PublicExploit:GitHub:AMEERPORNILLOS:CVE-2023-38831-WINRAR-EXPLOIT, Vulners:PublicExploit:GitHub:MYSTUFFYT:CVE-2023-38831-POC, Vulners:PublicExploit:GitHub:PASCALASCH:CVE-2023-38831-KQL, Vulners:PublicExploit:GitHub:SOLOMON12354:VOLLEYBALLSQUID-----CVE-2023-38831-AND-BYPASS-UAC, Vulners:PublicExploit:GitHub:IMBYTER:IMBYTER-WINRAR_CVE-2023-38831, Vulners:PublicExploit:GitHub:MALVIKA-THAKUR:CVE-2023-38831, Vulners:PublicExploit:GitHub:IGNIS-SEC:CVE-2023-38831-RARCE, Vulners:PublicExploit:GitHub:TECHNICALCORP0:CVE-2023-38831-EXPLOIT, Vulners:PublicExploit:GitHub:TECHNICALCORP2:CVE-2023-38831-EXPLOIT-GENERATOR, Vulners:PublicExploit:GitHub:NHMAN-PYTHON:CVE-2023-38831, Vulners:PublicExploit:GitHub:K3RNEL-DEV:WINRAREXPLOIT, Vulners:PublicExploit:GitHub:BENIBEASTT:CVE-2023-38831_REVERSESHELL_WINRAR, Vulners:PublicExploit:GitHub:THEGR1FFYN:CVE-2023-38831, Vulners:PublicExploit:GitHub:MY-ELLIOT:CVE-2023-38831-WINRAR-EXPOIT-SIMPLE-POC, Vulners:PublicExploit:GitHub:MALWAREMAN007:CVE-2023-38831, Vulners:PublicExploit:GitHub:RONF98:CVE-2023-38831-POC, Vulners:PublicExploit:GitHub:YEZZFUSL:CVE_2023_38831_SCANNER, Vulners:PublicExploit:GitHub:SPAMIXOFFICIAL:CVE-2023-38831, Vulners:PublicExploit:GitHub:Z3R0SW0RD:CVE-2023-38831-POC, Vulners:PublicExploit:GitHub:MAALFER:CVE-2023-38831_REVERSESHELL_WINRAR-RCE, Vulners:PublicExploit:GitHub:NIELK74:CVE-2023-38831, Vulners:PublicExploit:GitHub:R1YAZ:WINDED, Vulners:PublicExploit:GitHub:KEHRIJKSEN:CVE-2023-38831, Vulners:PublicExploit:GitHub:RUYCR4FT:CVE-2023-38831, Vulners:PublicExploit:GitHub:YOUMULIJIANG:EVIL-WINRAR, Vulners:PublicExploit:GitHub:MAALFER:CVE-2023-38831_REVERSESHELL, Vulners:PublicExploit:GitHub:B1TG:CVE-2023-38831-WINRAR-EXPLOIT, Vulners:PublicExploit:GitHub:BOREDHACKERBLOG:WINRAR_CVE-2023-38831_LAZY_POC, Vulners:PublicExploit:GitHub:VICTORIOUSKNIGHT:CVE-2023-38831_EXPLOIT, Vulners:PublicExploit:GitHub:MALVIKA-THAKUR:CVE-2023-38831-WINRAR-POC-, Vulners:PublicExploit:GitHub:XK-MT:WINRAR-VULNERABILITY-RECURRENCE-TUTORIAL, Vulners:PublicExploit:GitHub:FA1C0N35:CVE-2023-38831-WINRAR-EXPLOIT, Vulners:PublicExploit:GitHub:MICH-ELE:CVE-2023-38831-WINRAR, Vulners:PublicExploit:GitHub:GOTONYGO:CVE-2023-38831-WINRAR, Vulners:PublicExploit:GitHub:80R1NG:CVE-2023-38831-EXP, Vulners:PublicExploit:GitHub:HDCE-INC:CVE-2023-38831, Vulners:PublicExploit:GitHub:REZAGUII:WINRAR-EXPLOIT-CVE-2023-38831-TOOL, Vulners:PublicExploit:GitHub:MAORBUSKILA:WINDOWS-X64-RAT, Vulners:PublicExploit:GitHub:GARCK3H:CVE-2023-38831, Vulners:PublicExploit:GitHub:ELEFANTESAGRADODELUZINFINITA:CVE-2023-38831, Vulners:PublicExploit:GitHub:S4M98:WINRAR-CVE-2023-38831-POC-GEN, Vulners:PublicExploit:GitHub:XAITAX:WINRAR-CVE-2023-38831, Vulners:PublicExploit:GitHub:ASEPSAEPDIN:CVE-2023-38831, Vulners:PublicExploit:GitHub:AKHOMLYUK:CVE-2023-38831, Vulners:PublicExploit:GitHub:UNHACKERENCAPITAL:PDFERNETREMOTELO, Vulners:PublicExploit:GitHub:MORDAVID:CVE-2023-38831-WINRAR-EXPLOIT-GENERATOR-POC, Vulners:PublicExploit:GitHub:SPLOITUS:CVE-2024-29988-EXPLOIT, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:MSF:EXPLOIT-WINDOWS-FILEFORMAT-WINRAR_CVE_2023_38831-, Vulners:PublicExploit:EDB-ID:51935, Vulners:PublicExploit:PACKETSTORM:174573, Vulners:PublicExploit:PACKETSTORM:177803, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.814WinRAR is a trialware file archiver utility for Windows, developed by Eugene Roshal of win.rar GmbH
CVSS Base Score0.810CVSS Base Score is 7.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.9373, EPSS Percentile is 0.99838

2. Remote Code Execution - Roundcube (CVE-2020-12641) - Urgent [933]

Description: rcube_image.php in Roundcube Webmail before 1.4.4 allows attackers to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on NVD:PublicExploit:github.com, BDU:PublicExploit websites
Criticality of Vulnerability Type1.015Remote Code Execution
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.80252, EPSS Percentile is 0.99053

3. Code Injection - Roundcube (CVE-2021-44026) - Urgent [927]

Description: Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to a potential SQL injection via search or search_params.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:PENTESTTOOLSCOM:ROUNDCUBE-CVE-2021-44026 website
Criticality of Vulnerability Type0.9715Code Injection
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score1.010CVSS Base Score is 9.8. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.71898, EPSS Percentile is 0.9864

4. Elevation of Privilege - Microsoft Outlook (CVE-2023-23397) - Urgent [906]

Description: Microsoft Outlook Elevation of Privilege Vulnerability

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, Microsoft, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:AHMEDKHLIEF:CVE-2023-23397-POC-USING-INTEROP-OUTLOOK, Vulners:PublicExploit:GitHub:BILLSKICO:CVE-2023-23397_EXPLOIT, Vulners:PublicExploit:GitHub:CLEVERG0D:CVE-2023-23397-POC-POWERSHELL, Vulners:PublicExploit:GitHub:DJACKREUTER:CVE-2023-23397-POC, Vulners:PublicExploit:GitHub:GILOSPY:CVE-2023-23397, Vulners:PublicExploit:GitHub:AGENTGILSPY:CVE-2023-23397, Vulners:PublicExploit:GitHub:IM007:CVE-2023-23397, Vulners:PublicExploit:GitHub:KA7ANA:CVE-2023-23397, Vulners:PublicExploit:GitHub:SECCTECHS:CVE-2023-23397, Vulners:PublicExploit:GitHub:MONEERTV:CVE-2023-23397, Vulners:PublicExploit:GitHub:BRONZEBEE:CVE-2023-23397, Vulners:PublicExploit:GitHub:SQRTZEROKNOWLEDGE:CVE-2023-23397_EXPLOIT_0DAY, Vulners:PublicExploit:GitHub:ZEPPPERONI:CVE-2023-23397-PATCH, Vulners:PublicExploit:GitHub:TIEPOLOGIAN:CVE-2023-23397, Vulners:PublicExploit:GitHub:THEUNKNOWNSOUL:CVE-2023-23397-POW, Vulners:PublicExploit:GitHub:VLAD-A-MAN:CVE-2023-23397, Vulners:PublicExploit:GitHub:JACQUESQUAIL:CVE-2023-23397, Vulners:PublicExploit:GitHub:PUSHKARUP:CVE-2023-23397, Vulners:PublicExploit:GitHub:D7-M:CVE-2023-23397-EXPLOIT, Vulners:PublicExploit:GitHub:STEVESEC:CVE-2023-23397, Vulners:PublicExploit:GitHub:API0CRADLE:CVE-2023-23397-POC-POWERSHELL, Vulners:PublicExploit:GitHub:AHMEDKHLIEF:CVE-2023-23397-POC, Vulners:PublicExploit:GitHub:MUHAMMAD-ALI007:OUTLOOKNTLM_CVE-2023-23397, Vulners:PublicExploit:GitHub:TRACKFLAW:CVE-2023-23397, Vulners:PublicExploit:GitHub:HKTALENT:TOP, Vulners:PublicExploit:GitHub:GHOSTTROOPS:TOP, BDU:PublicExploit websites
Criticality of Vulnerability Type0.8515Elevation of Privilege
Vulnerable Product is Common0.614Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites
CVSS Base Score1.010CVSS Base Score is 9.8. According to Microsoft data source
EPSS Percentile1.010EPSS Probability is 0.93765, EPSS Percentile is 0.99845

5. Cross Site Scripting - Roundcube (CVE-2020-35730) - Urgent [850]

Description: An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.

ComponentValueWeightComment
Exploited in the Wild1.018Exploitation in the wild is mentioned on Vulners (AttackerKB object, cisa_kev object), AttackerKB, NVD:CISAKEV, BDU websites
Exploit Exists1.017The existence of a publicly available exploit is mentioned on Vulners:PublicExploit:GitHub:PENTESTTOOLSCOM:ROUNDCUBE-CVE-2021-44026 website
Criticality of Vulnerability Type0.815Cross Site Scripting
Vulnerable Product is Common0.614Roundcube is a web-based IMAP email client
CVSS Base Score0.610CVSS Base Score is 6.1. According to NVD data source
EPSS Percentile1.010EPSS Probability is 0.58828, EPSS Percentile is 0.98069

Critical (0)

High (0)

Medium (0)

Low (0)

Exploitation in the wild detected (5)

Remote Code Execution (2)

Code Injection (1)

Elevation of Privilege (1)

Cross Site Scripting (1)

Public exploit exists, but exploitation in the wild is NOT detected (0)

Other Vulnerabilities (0)