{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T10:11:21.260","vulnerabilities":[{"cve":{"id":"CVE-2005-3262","sourceIdentifier":"cve@mitre.org","published":"2005-10-20T10:02:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in RARLAB WinRAR 2.90 through 3.50 allows remote attackers to execute arbitrary code via format string specifiers in a UUE/XXE file, which are not properly handled when WinRAR displays diagnostic errors related to an invalid filename."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:2.90:*:*:*:*:*:*:*","matchCriteriaId":"0FFE81D1-EE81-415D-ACE0-F97AF38BE007"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"53BDA79B-B1CC-479C-A1DA-41DDDE098EDB"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.10:*:*:*:*:*:*:*","matchCriteriaId":"16A1E0B7-020F-4110-9603-58CA8CEB7581"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.10_beta3:*:*:*:*:*:*:*","matchCriteriaId":"AE627C32-9F4B-4D36-AC4B-5D01A47BFD88"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.10_beta5:*:*:*:*:*:*:*","matchCriteriaId":"3366C2D1-F30A-413B-94A2-7DBDACC083EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.11:*:*:*:*:*:*:*","matchCriteriaId":"8585089C-A6B5-4BFE-BEA3-133B94F24F72"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.20:*:*:*:*:*:*:*","matchCriteriaId":"C1011521-AEF2-40EB-B671-66B20FF01CC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.40:*:*:*:*:*:*:*","matchCriteriaId":"9843D850-DC4C-49D5-AAEB-EF75FB54F08C"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.41:*:*:*:*:*:*:*","matchCriteriaId":"2C9B3100-2223-4201-AE29-B4A4EAFF2595"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.42:*:*:*:*:*:*:*","matchCriteriaId":"7F95B556-A1B4-4AEF-8223-5ED44819515D"},{"vulnerable":true,"criteria":"cpe:2.3:a:rarlab:winrar:3.50:*:*:*:*:*:*:*","matchCriteriaId":"C89BC32A-6D3B-4B83-BD49-856233EEF51C"}]}]}],"references":[{"url":"http://secunia.com/advisories/16973/","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/secunia_research/2005-53/advisory/","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.rarlabs.com/rarnew.htm","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/15062","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://secunia.com/advisories/16973/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/secunia_research/2005-53/advisory/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.rarlabs.com/rarnew.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/15062","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}}]}