Vulnerabilities (CVE)

Filtered by vendor Shilpisoft Subscribe
Filtered by product Client Dashboard
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-47656 1 Shilpisoft 1 Client Dashboard 2024-10-16 N/A 9.8 CRITICAL
This vulnerability exists in Shilpi Client Dashboard due to missing restrictions for incorrect login attempts on its API based login. A remote attacker could exploit this vulnerability by conducting a brute force attack on password, which could lead to gain unauthorized access to other user accounts.
CVE-2024-47655 1 Shilpisoft 1 Client Dashboard 2024-10-16 N/A 8.8 HIGH
This vulnerability exists in the Shilpi Client Dashboard due to improper validation of files being uploaded other than the specified extension. An authenticated remote attacker could exploit this vulnerability by uploading malicious file, which could lead to remote code execution on targeted application.
CVE-2024-47654 1 Shilpisoft 1 Client Dashboard 2024-10-16 N/A 7.5 HIGH
This vulnerability exists in Shilpi Client Dashboard due to lack of rate limiting and Captcha protection for OTP requests in certain API endpoint. An unauthenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoints, which could lead to the OTP bombing on the targeted system.
CVE-2024-47653 1 Shilpisoft 1 Client Dashboard 2024-10-16 N/A 6.5 MEDIUM
This vulnerability exists in Shilpi Client Dashboard due to lack of authorization for modification and cancellation requests through certain API endpoints. An authenticated remote attacker could exploit this vulnerability by placing or cancelling requests through API request body leading to unauthorized modification of requests belonging to the other users.
CVE-2024-47652 1 Shilpisoft 1 Client Dashboard 2024-10-16 N/A 8.1 HIGH
This vulnerability exists in Shilpi Client Dashboard due to implementation of inadequate authentication mechanism in the login module wherein access to any users account is granted with just their corresponding mobile number. A remote attacker could exploit this vulnerability by providing mobile number of targeted user, to obtain complete access to the targeted user account.