Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lhaz lhaz vulnerabilities and exploits
(subscribe to this query)
454
VMScore
CVE-2006-4116
Multiple stack-based buffer overflows in Lhaz prior to 1.32 allow user-assisted malicious users to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing ...
Lhaz Lhaz
605
VMScore
CVE-2007-4428
Lhaz 1.33 allows remote malicious users to execute arbitrary code via unknown vectors, as actively exploited in August 2007 by the Exploit-LHAZ.a gzip file, a different issue than CVE-2006-4116.
Lhaz Lhaz 1.33
828
VMScore
CVE-2017-2246
Untrusted search path vulnerability in Installer of Lhaz version 2.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz
828
VMScore
CVE-2017-2247
Untrusted search path vulnerability in Self-extracting archive files created by Lhaz version 2.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz
828
VMScore
CVE-2017-2248
Untrusted search path vulnerability in Installer of Lhaz+ version 3.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz\\+
828
VMScore
CVE-2017-2249
Untrusted search path vulnerability in Self-extracting archive files created by Lhaz+ version 3.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz\\+
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started