Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lhaz lhaz vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-4116
Multiple stack-based buffer overflows in Lhaz prior to 1.32 allow user-assisted malicious users to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing ...
Lhaz Lhaz
NA
CVE-2007-4428
Lhaz 1.33 allows remote malicious users to execute arbitrary code via unknown vectors, as actively exploited in August 2007 by the Exploit-LHAZ.a gzip file, a different issue than CVE-2006-4116.
Lhaz Lhaz 1.33
7.8
CVSSv3
CVE-2017-2246
Untrusted search path vulnerability in Installer of Lhaz version 2.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz
7.8
CVSSv3
CVE-2017-2247
Untrusted search path vulnerability in Self-extracting archive files created by Lhaz version 2.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz
7.8
CVSSv3
CVE-2017-2249
Untrusted search path vulnerability in Self-extracting archive files created by Lhaz+ version 3.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz\\+
7.8
CVSSv3
CVE-2017-2248
Untrusted search path vulnerability in Installer of Lhaz+ version 3.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz\\+
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started