exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files

Lepton 2.2.2 Stable Shell Upload
Posted Nov 18, 2016
Authored by Tim Coen | Site curesec.com

Lepton version 2.2.2 Stable suffers from a remote code execution vulnerability via a remote shell upload.

tags | exploit, remote, shell, code execution
SHA-256 | 8663af49ec6d8452bc4632a183607bae585d36a51bed1d527eeed84afed70485

Related Files

Lepton CMS 7.0.0 Remote Code Execution
Posted Jan 19, 2024
Authored by tmrswrr

Lepton CMS version 7.0.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | e49b03d230a8b76fb8464dbbc5243150ad7d594058444b9ce7dc55ee672e6138
Gentoo Linux Security Advisory 202312-01
Posted Dec 18, 2023
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202312-1 - Several vulnerabilities have been found in Leptonice, the worst of which could lead to arbitrary code execution. Versions greater than or equal to 1.81.0 are affected.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2017-18196, CVE-2018-7186, CVE-2018-7247, CVE-2018-7440, CVE-2018-7441, CVE-2018-7442, CVE-2022-38266
SHA-256 | 15792a867789f26ef677a41865c5d76fdd953d01a4e50faab0b867ba1464cb8b
Gentoo Linux Security Advisory 202107-53
Posted Jul 24, 2021
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202107-53 - Multiple vulnerabilities have been found in Leptonica, the worst of which could result in a Denial of Service condition. Versions less than 1.80.0 are affected.

tags | advisory, denial of service, vulnerability
systems | linux, gentoo
advisories | CVE-2020-36277, CVE-2020-36278, CVE-2020-36279, CVE-2020-36280, CVE-2020-36281
SHA-256 | e4094466e6785ae63b42495f57a770d43e3f6dc7c4a9e5c53dd0295e0ac6e8c7
LeptonCMS 4.5.0 Cross Site Scripting
Posted Mar 25, 2020
Authored by SunCSR

LeptonCMS version 4.5.0 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 69f616129e2c4bf5f159ecfb5f0750a11ca30ed7cf043ca3adbd5518d48f2b43
Lepton 2.2.2 Stable CSRF / Open Redirect / Password Handling
Posted Nov 18, 2016
Authored by Tim Coen | Site curesec.com

Lepton version 2.2.2 Stable suffers from password handling, insecure bruteforce protection, cross site request forgery, and open redirection vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | df1f3345f2e86eee1b373326e540a9ee8f1abfcff075fd6b3f8e424a50bd8910
Lepton 2.2.2 Stable SQL Injection
Posted Nov 18, 2016
Authored by Tim Coen | Site curesec.com

Lepton version 2.2.2 Stable suffers from remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 95850d5028036da80ebf188fdc254367da972342753ef2bb43fdd5faf279746f
Lepton CMS 2.2.0 / 2.2.1 PHP Code Injection
Posted Aug 16, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Lepton CMS versions 2.2.0 and 2.2.1 suffer from a PHP code injection vulnerability.

tags | exploit, php
SHA-256 | 7a8491e07971f4d5fbf5e8f5ce690f163cde25c1719489e47056633908b74736
Lepton CMS 2.2.0 / 2.2.1 Directory Traversal
Posted Aug 16, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Lepton CMS versions 2.2.0 and 2.2.1 suffer from a directory traversal vulnerability.

tags | exploit
SHA-256 | 0be91ef33d5c0bc16086ab233e07964b406340a17ddb1ee63ca424c685eda1f9
Lepton CMS 1.2.0 Cross Site Scripting
Posted Jul 16, 2012
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Lepton CMS version 1.2.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | a1950761b16455f0831bfaca8919628053e40986ef93c4860bbb883b3dd0f353
Secunia Security Advisory 47981
Posted Feb 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered multiple vulnerabilities in LEPTON CMS, which can be exploited by malicious users to disclose sensitive information and conduct script insertion attacks and by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 6bf7f8a23d956c90c1212d7ce4cac2a2f6a51ba355b2e5171eb30976085f69db
LEPTON 1.1.3 SQL Injection / XSS / Local File Inclusion
Posted Feb 16, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

LEPTON version 1.1.3 suffers from cross site scripting, local file inclusion, and remote SQL injection vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, sql injection, file inclusion
SHA-256 | d12a10e42756a5bf2e8d46644497e1bd8e5a662388c4c27617ed481410aca7d6
lcrack-1.0.1.tar.gz
Posted Dec 20, 2002
Site usuarios.lycos.es

Lepton crack is a password cracker that works on Cygwin and Linux and cracks MD4 hashes, MD5 hashes, NTLM, and HTTPpassword hashes from Domino R4.

tags | cracker
systems | linux
SHA-256 | 89875cf60cf3828b1d061d9b94f2b56f562e545a14a3fce1a7d6e664ea91568e
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close