CVE-2024-48357

LyLme Spage 1.2.0 through 1.6.0 is vulnerable to SQL Injection via /admin/apply.php.
References
Link Resource
https://github.com/Jingyi-u/LyLme_Spage_2/blob/main/README.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:lylme:lylme_spage:*:*:*:*:*:*:*:*

History

28 Apr 2025, 17:37

Type Values Removed Values Added
First Time Lylme
Lylme lylme Spage
References () https://github.com/Jingyi-u/LyLme_Spage_2/blob/main/README.md - () https://github.com/Jingyi-u/LyLme_Spage_2/blob/main/README.md - Exploit, Third Party Advisory
CPE cpe:2.3:a:lylme:lylme_spage:*:*:*:*:*:*:*:*

30 Oct 2024, 17:35

Type Values Removed Values Added
CWE CWE-89
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

29 Oct 2024, 14:34

Type Values Removed Values Added
Summary
  • (es) LyLme Spage 1.2.0 a 1.6.0 es vulnerable a la inyección SQL a través de /admin/apply.php.

28 Oct 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-28 20:15

Updated : 2025-04-28 17:37


NVD link : CVE-2024-48357

Mitre link : CVE-2024-48357

CVE.ORG link : CVE-2024-48357


JSON object : View

Products Affected

lylme

  • lylme_spage
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')