source: https://www.securityfocus.com/bid/17153/info Reportedly, an attacker can carry out directory-traversal attacks. These issues present themselves when the application processes malformed archives. A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. A successful exploit may aid in further attacks. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27450.zip