📦 Lylme Spage
by Lylme
🔍 What is Lylme Spage?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
Lylme Spage v1.9.5 has an authentication bypass vulnerability due to missing login attempt limits and static verification codes. Attackers can brute-force credentials to gain unauthorized access to th...
LyLme Spage versions up to 1.6.0 contain a SQL injection vulnerability in the /admin/group.php endpoint. This allows attackers to execute arbitrary SQL commands on the database. All users running vuln...
LyLme Spage versions 1.2.0 through 1.6.0 contain a SQL injection vulnerability in the /admin/apply.php endpoint. This allows attackers to execute arbitrary SQL commands on the database, potentially co...
LyLme_spage v1.9.5 contains a Server-Side Request Forgery (SSRF) vulnerability in the get_head function that allows attackers to make arbitrary HTTP requests from the vulnerable server. This can lead ...
CVE-2023-45951 is a SQL injection vulnerability in lylme_spage v1.7.0 that allows attackers to execute arbitrary SQL commands via the $userip parameter. This affects all users running the vulnerable v...
This critical SQL injection vulnerability in LyLme Spage 2.1 allows remote attackers to execute arbitrary SQL commands via the 'sort' parameter in admin/ajax_link.php. Attackers can potentially read, ...
This vulnerability allows remote attackers to execute arbitrary SQL commands via the 'id' parameter in the /admin/sou.php file in LyLme_spage 1.9.5. Attackers can potentially access, modify, or delete...
This vulnerability allows remote attackers to execute SQL injection attacks via the 'id' parameter in the /admin/tag.php file in LyLme_spage 1.9.5. Attackers can potentially read, modify, or delete da...