Show filters
34 Total Results
Displaying 11-20 of 34
Sort by:
Attacker Value
Unknown

CVE-2020-29240

Disclosure Date: December 02, 2020 (last updated February 22, 2025)
Lepton-CMS 4.7.0 is affected by cross-site scripting (XSS). An attacker can inject the XSS payload in the URL field of the admin page and each time an admin visits the Menu-Pages-Pages Overview section, the XSS will be triggered.
Attacker Value
Unknown

CVE-2020-12707

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An XSS vulnerability exists in modules/wysiwyg/save.php of LeptonCMS 4.5.0. This can be exploited because the only security measure used against XSS is the stripping of SCRIPT elements. A malicious actor can use HTML event handlers to run JavaScript instead of using SCRIPT elements.
Attacker Value
Unknown

CVE-2020-12705

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
Multiple cross-site scripting (XSS) vulnerabilities exist in LeptonCMS before 4.6.0.
Attacker Value
Unknown

CVE-2018-20819

Disclosure Date: April 23, 2019 (last updated November 27, 2024)
io/ZlibCompression.cc in the decompression component in Dropbox Lepton 1.2.1 allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact by crafting a jpg image file. The root cause is a missing check of header payloads that may be (incorrectly) larger than the maximum file size.
0
Attacker Value
Unknown

CVE-2018-20820

Disclosure Date: April 23, 2019 (last updated November 27, 2024)
read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file.
0
Attacker Value
Unknown

CVE-2018-12108

Disclosure Date: June 11, 2018 (last updated November 26, 2024)
An issue was discovered in Dropbox Lepton 1.2.1. The validateAndCompress function in validation.cc allows remote attackers to cause a denial of service (SIGFPE and application crash) via a malformed file.
0
Attacker Value
Unknown

CVE-2018-3836

Disclosure Date: April 24, 2018 (last updated November 26, 2024)
An exploitable command injection vulnerability exists in the gplotMakeOutput function of Leptonica 1.74.4. A specially crafted gplot rootname argument can cause a command injection resulting in arbitrary code execution. An attacker can provide a malicious path as input to an application that passes attacker data to this function to trigger this vulnerability.
Attacker Value
Unknown

CVE-2018-7442

Disclosure Date: February 23, 2018 (last updated December 19, 2023)
An issue was discovered in Leptonica through 1.75.3. The gplotMakeOutput function does not block '/' characters in the gplot rootname argument, potentially leading to path traversal and arbitrary file overwrite.
0
Attacker Value
Unknown

CVE-2018-7441

Disclosure Date: February 23, 2018 (last updated December 19, 2023)
Leptonica through 1.75.3 uses hardcoded /tmp pathnames, which might allow local users to overwrite arbitrary files or have unspecified other impact by creating files in advance or winning a race condition, as demonstrated by /tmp/junk_split_image.ps in prog/splitimage2pdf.c.
0
Attacker Value
Unknown

CVE-2017-18196

Disclosure Date: February 23, 2018 (last updated December 19, 2023)
Leptonica 1.74.4 constructs unintended pathnames (containing duplicated path components) when operating on files in /tmp subdirectories, which might allow local users to bypass intended file restrictions by leveraging access to a directory located deeper within the /tmp directory tree, as demonstrated by /tmp/ANY/PATH/ANY/PATH/input.tif.
0