realguoshuai open-video-cms 1.0 /v1/video/list sort SQL ଇଞ୍ଜେକ୍ସନ

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu realguoshuai open-video-cms 1.0 keessatti argameera. Miidhamni argame is hojii hin beekamne faayilii /v1/video/list keessa. Wanti jijjiirame irratti sort gara SQL ଇଞ୍ଜେକ୍ସନ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-89 si geessa. Odeeffannoon kun yeroo 06/15/2025 maxxanfameera. Odeeffannoon kun buufachuuf github.com irratti argama. Dogoggorri kun CVE-2025-6100 jedhamee waamama. Weerara fageenya irraa jalqabuu ni danda'ama. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit github.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

6 ଆଡାପ୍ଟେସନ୍ · 113 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 1/5
06/16/2025 04:55 AM
ଅଦ୍ୟତନ 2/5
06/16/2025 05:49 AM
ଅଦ୍ୟତନ 3/5
06/16/2025 06:05 AM
ଅଦ୍ୟତନ 4/5
06/16/2025 06:08 AM
ଅଦ୍ୟତନ 5/5
06/16/2025 11:35 AM
software_vendorrealguoshuairealguoshuairealguoshuairealguoshuairealguoshuai
software_nameopen-video-cmsopen-video-cmsopen-video-cmsopen-video-cmsopen-video-cms
software_version1.01.01.01.01.0
software_file/v1/video/list/v1/video/list/v1/video/list/v1/video/list/v1/video/list
software_argumentsortsortsortsortsort
vulnerability_cweCWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)CWE-89 (SQL ଇଞ୍ଜେକ୍ସନ)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cLLLLL
cvss3_vuldb_iLLLLL
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/Bemcliu/cve/blob/main/README.mdhttps://github.com/Bemcliu/cve/blob/main/README.mdhttps://github.com/Bemcliu/cve/blob/main/README.mdhttps://github.com/Bemcliu/cve/blob/main/README.mdhttps://github.com/Bemcliu/cve/blob/main/README.md
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/Bemcliu/cve/blob/main/README.md#pochttps://github.com/Bemcliu/cve/blob/main/README.md#pochttps://github.com/Bemcliu/cve/blob/main/README.md#pochttps://github.com/Bemcliu/cve/blob/main/README.md#pochttps://github.com/Bemcliu/cve/blob/main/README.md#poc
source_cveCVE-2025-6100CVE-2025-6100CVE-2025-6100CVE-2025-6100CVE-2025-6100
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcLLLLL
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_prLLLLL
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_prLLLLL
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore6.56.56.56.56.5
cvss2_vuldb_tempscore5.65.65.65.65.6
cvss3_vuldb_basescore6.36.36.36.36.3
cvss3_vuldb_tempscore5.75.75.75.75.7
cvss3_meta_basescore6.36.36.37.57.5
cvss3_meta_tempscore6.06.06.07.17.1
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore2.12.12.12.12.1
advisory_date1749938400 (06/15/2025)1749938400 (06/15/2025)1749938400 (06/15/2025)1749938400 (06/15/2025)1749938400 (06/15/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
software_typeContent Management SystemContent Management SystemContent Management SystemContent Management SystemContent Management System
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciPPPPP
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiPPPPP
cve_nvd_summaryA vulnerability was found in realguoshuai open-video-cms 1.0. It has been rated as critical. This issue affects some unknown processing of the file /v1/video/list. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in realguoshuai open-video-cms 1.0. It has been rated as critical. This issue affects some unknown processing of the file /v1/video/list. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in realguoshuai open-video-cms 1.0. It has been rated as critical. This issue affects some unknown processing of the file /v1/video/list. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in realguoshuai open-video-cms 1.0. It has been rated as critical. This issue affects some unknown processing of the file /v1/video/list. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in realguoshuai open-video-cms 1.0. It has been rated as critical. This issue affects some unknown processing of the file /v1/video/list. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNNNNN
cvss4_cna_acLLLLL
cvss4_cna_atNNNNN
cvss4_cna_prLLLLL
cvss4_cna_uiNNNNN
cvss4_cna_vcLLLLL
cvss4_cna_viLLLLL
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore5.35.35.35.35.3
cvss3_cna_avNNNNN
cvss3_cna_acLLLLL
cvss3_cna_prLLLLL
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cLLLLL
cvss3_cna_iLLLLL
cvss3_cna_aLLLLL
cvss3_cna_basescore6.36.36.36.36.3
cvss2_cna_avNNNNN
cvss2_cna_acLLLLL
cvss2_cna_auSSSSS
cvss2_cna_ciPPPPP
cvss2_cna_iiPPPPP
cvss2_cna_aiPPPPP
cvss2_cna_basescore6.56.56.56.56.5
euvd_idEUVD-2025-18355EUVD-2025-18355EUVD-2025-18355EUVD-2025-18355
cvss3_researcher_iHHH
cvss3_researcher_ePPP
cvss3_researcher_avNNN
cvss3_researcher_acLLL
cvss3_researcher_rlWWW
cvss2_researcher_acLLL
cvss2_researcher_auNNN
cvss2_researcher_ePOCPOCPOC
cvss3_researcher_prNNN
cvss3_researcher_rcCCC
cvss2_researcher_iiCCC
cvss2_researcher_avNNN
cvss3_researcher_aHHH
cvss2_researcher_aiCCC
cvss3_researcher_cHHH
cvss2_researcher_ciCCC
cvss2_researcher_rlWWW
cvss2_researcher_rcCCC
cvss3_researcher_uiNNN
cvss3_researcher_sCCC
cvss2_researcher_basescore10.010.0
cvss3_researcher_basescore10.010.0
cve_nvd_summaryesSe encontró una vulnerabilidad en realguoshuai open-video-cms 1.0. Se ha clasificado como crítica. Este problema afecta a un procesamiento desconocido del archivo /v1/video/list. La manipulación del argumento sort provoca una inyección SQL. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación sobre esta divulgación, pero no respondió.

Interested in the pricing of exploits?

See the underground prices here!