Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
lhaz lhaz vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2006-4116
Multiple stack-based buffer overflows in Lhaz prior to 1.32 allow user-assisted malicious users to execute arbitrary code via a long filename in (1) an LHZ archive, when saving the filename during extraction; and (2) an LHZ archive with an invalid CRC checksum, when constructing ...
Lhaz Lhaz
6.8
CVSSv2
CVE-2007-4428
Lhaz 1.33 allows remote malicious users to execute arbitrary code via unknown vectors, as actively exploited in August 2007 by the Exploit-LHAZ.a gzip file, a different issue than CVE-2006-4116.
Lhaz Lhaz 1.33
9.3
CVSSv2
CVE-2017-2246
Untrusted search path vulnerability in Installer of Lhaz version 2.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz
9.3
CVSSv2
CVE-2017-2248
Untrusted search path vulnerability in Installer of Lhaz+ version 3.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz\\+
9.3
CVSSv2
CVE-2017-2249
Untrusted search path vulnerability in Self-extracting archive files created by Lhaz+ version 3.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz\\+
9.3
CVSSv2
CVE-2017-2247
Untrusted search path vulnerability in Self-extracting archive files created by Lhaz version 2.4.0 and previous versions allows an malicious user to gain privileges via a Trojan horse DLL in an unspecified directory.
Chitora Lhaz
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started