It is possible to create specially crafted ARJ archives that cause a buffer overflow. This allows an attacker to execute code of his choice on the target system. Note that a severity class has been assigned to each product family separately as the risk for successful exploitation of this vulnerability varies