Vulnerability Database
Blog
FAQ
Docs
CVE-2024-48357
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-48357
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-48357.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-48357
Published
2024-10-28T20:15:06Z
Modified
2025-04-29T07:59:17.878542Z
Summary
[none]
Details
LyLme Spage 1.2.0 through 1.6.0 is vulnerable to SQL Injection via /admin/apply.php.
References
https://github.com/Jingyi-u/LyLme_Spage_2/blob/main/README.md
Affected packages
Git
/
github.com/lylme/lylme_spage
Affected ranges
Type
GIT
Repo
https://github.com/lylme/lylme_spage
Events
Introduced
279e5c02b760a8561f27d33d4b045505f9e9267b
Last affected
31f42528e824662444259e73c3e03f05b2e09d53
Affected versions
v1.*
v1.2.0
v1.3.0
v1.5.0
v1.5.1
v1.6.0
CVE-2024-48357 - OSV