Lylme Spage v1.9.5 is vulnerable to Incorrect Access Control. There is no limit on the number of login attempts, and the verification code will not be refreshed after a failed login, which allows attackers to blast the username and password and log into the system backend.
History

Wed, 06 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Lylme
Lylme lylme Spage
Weaknesses CWE-863
CPEs cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*
Vendors & Products Lylme
Lylme lylme Spage
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 Nov 2024 22:45:00 +0000

Type Values Removed Values Added
Description Lylme Spage v1.9.5 is vulnerable to Incorrect Access Control. There is no limit on the number of login attempts, and the verification code will not be refreshed after a failed login, which allows attackers to blast the username and password and log into the system backend.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-11-05T00:00:00

Updated: 2024-11-06T16:04:46.895Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48176

cve-icon Vulnrichment

Updated: 2024-11-06T16:04:38.700Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-05T23:15:04.470

Modified: 2024-11-06T18:17:17.287

Link: CVE-2024-48176

cve-icon Redhat

No data.