Vulnerabilities > Lhaplus

DATE CVE VULNERABILITY TITLE RISK
2015-04-15 CVE-2015-0907 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Lhaplus
Buffer overflow in Lhaplus before 1.70 allows remote attackers to execute arbitrary code via a crafted archive.
network
lhaplus CWE-119
6.8
2015-04-15 CVE-2015-0906 Path Traversal vulnerability in Lhaplus
Directory traversal vulnerability in Lhaplus before 1.70 allows remote attackers to write to arbitrary files via a crafted archive.
network
lhaplus CWE-22
5.8
2010-10-19 CVE-2010-3158 Unspecified vulnerability in Lhaplus
Untrusted search path vulnerability in Lhaplus before 1.58 allows local users to gain privileges via a Trojan horse executable file in the current working directory.
local
lhaplus
6.9
2010-10-18 CVE-2010-2368 Unspecified vulnerability in Lhaplus
Untrusted search path vulnerability in Lhaplus before 1.58 allows local users to gain privileges via a Trojan horse DLL in the current working directory.
local
lhaplus
6.9
2008-04-30 CVE-2008-2021 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Lhaplus
Heap-based buffer overflow in Lhaplus before 1.57 allows remote attackers to execute arbitrary code via a long comment field in a ZOO archive.
network
low complexity
lhaplus CWE-119
7.5
2007-11-30 CVE-2007-6175 Buffer Errors vulnerability in Lhaplus 1.55
Buffer overflow in Lhaplus 1.55 and earlier allows remote attackers to execute arbitrary code via a crafted LZH archive, a different vector than CVE-2007-5048.
network
high complexity
lhaplus CWE-119
6.6
2007-09-24 CVE-2007-5048 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Lhaplus 1.52/1.53
Heap-based buffer overflow in Lhaplus before 1.55 allows remote attackers to execute arbitrary code via a long filename in an ARJ archive.
network
low complexity
lhaplus CWE-119
7.5
2006-08-09 CVE-2006-4033 Buffer Overflow vulnerability in Lhaplus 1.52
Heap-based buffer overflow in Lhaplus.exe in Lhaplus 1.52, and possibly earlier versions, allows remote attackers to execute arbitrary code via an LZH archive with a long header, as specified by the extendedHeaderSize.
network
high complexity
lhaplus
5.1