Filtered by vendor Lhaplus
                         Subscriptions
                    
                    
                
                        Filtered by product Lhaplus
                         Subscriptions
                    
                    
                
                    Total
                    8 CVE
                
            | CVE | Vendors | Products | Updated | CVSS v3.1 | 
|---|---|---|---|---|
| CVE-2015-0906 | 1 Lhaplus | 1 Lhaplus | 2025-04-12 | N/A | 
| Directory traversal vulnerability in Lhaplus before 1.70 allows remote attackers to write to arbitrary files via a crafted archive. | ||||
| CVE-2015-0907 | 1 Lhaplus | 1 Lhaplus | 2025-04-12 | N/A | 
| Buffer overflow in Lhaplus before 1.70 allows remote attackers to execute arbitrary code via a crafted archive. | ||||
| CVE-2010-2368 | 1 Lhaplus | 1 Lhaplus | 2025-04-11 | N/A | 
| Untrusted search path vulnerability in Lhaplus before 1.58 allows local users to gain privileges via a Trojan horse DLL in the current working directory. | ||||
| CVE-2010-3158 | 1 Lhaplus | 1 Lhaplus | 2025-04-11 | N/A | 
| Untrusted search path vulnerability in Lhaplus before 1.58 allows local users to gain privileges via a Trojan horse executable file in the current working directory. | ||||
| CVE-2008-2021 | 1 Lhaplus | 1 Lhaplus | 2025-04-09 | N/A | 
| Heap-based buffer overflow in Lhaplus before 1.57 allows remote attackers to execute arbitrary code via a long comment field in a ZOO archive. | ||||
| CVE-2007-6175 | 1 Lhaplus | 1 Lhaplus | 2025-04-09 | N/A | 
| Buffer overflow in Lhaplus 1.55 and earlier allows remote attackers to execute arbitrary code via a crafted LZH archive, a different vector than CVE-2007-5048. | ||||
| CVE-2007-5048 | 1 Lhaplus | 1 Lhaplus | 2025-04-09 | N/A | 
| Heap-based buffer overflow in Lhaplus before 1.55 allows remote attackers to execute arbitrary code via a long filename in an ARJ archive. | ||||
| CVE-2006-4033 | 1 Lhaplus | 1 Lhaplus | 2025-04-03 | N/A | 
| Heap-based buffer overflow in Lhaplus.exe in Lhaplus 1.52, and possibly earlier versions, allows remote attackers to execute arbitrary code via an LZH archive with a long header, as specified by the extendedHeaderSize. | ||||
                            
                                
                                
                                    Page 1 of 1.