SohuTV CacheCloud ଯେପର୍ଯ୍ୟନ୍ତ 3.2.0 AppController.java doAppList/appCommandAnalysis କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame SohuTV CacheCloud ଯେପର୍ଯ୍ୟନ୍ତ 3.2.0 keessatti argameera. Miidhaan irra gahe is hojii doAppList/appCommandAnalysis faayilii src/main/java/com/sohu/cache/web/controller/AppController.java keessa. Dhugumatti jijjiirraa gara କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ geessa. Waliigalteewwan CWE fayyadamuun rakkoo ibsuun gara CWE-79 si geessa. Beekumsi kun yeroo 12/28/2025 ifoomsifameera akka 371/381. Odeeffannoon kun buufachuuf github.com irratti dhiyaateera. Dogoggorri kun maqaa CVE-2025-15175 jedhuun tajaajilama. Weerara fageenya irraa jalqabuun ni danda'ama. Odeeffannoon teeknikaa ni argama. Akka dabalataan, meeshaa balaa kana fayyadamuuf argama. Qorannoo miidhaa (exploit) beeksifamee jira, namoonni itti fayyadamuu danda'u. Yeroo ammaa, gatii exploit might be approx. USD $0-$5k beekamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ jedhamee murtaa’eera. Exploit kana github.com irraa buufachuu ni dandeessa. Waggaa 0-day ta'ee, gatiin isaa daldala dhoksaa keessatti $0-$5k jedhamee tilmaamame. Once again VulDB remains the best source for vulnerability data.

5 ଆଡାପ୍ଟେସନ୍ · 103 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
12/28/2025 09:24 AM
ଅଦ୍ୟତନ 1/4
12/28/2025 04:56 PM
ଅଦ୍ୟତନ 2/4
12/29/2025 08:14 AM
ଅଦ୍ୟତନ 3/4
12/29/2025 08:30 AM
ଅଦ୍ୟତନ 4/4
01/07/2026 02:48 PM
cvss3_vuldb_uiRRRRR
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iLLLLL
cvss3_vuldb_aNNNNN
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_identifier371371/381371/381371/381371/381
advisory_urlhttps://github.com/sohutv/cachecloud/issues/371https://github.com/sohutv/cachecloud/issues/371https://github.com/sohutv/cachecloud/issues/371https://github.com/sohutv/cachecloud/issues/371https://github.com/sohutv/cachecloud/issues/371
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/sohutv/cachecloud/issues/371#issue-3733569967https://github.com/sohutv/cachecloud/issues/381https://github.com/sohutv/cachecloud/issues/381https://github.com/sohutv/cachecloud/issues/381https://github.com/sohutv/cachecloud/issues/381
source_cveCVE-2025-15175CVE-2025-15175CVE-2025-15175CVE-2025-15175CVE-2025-15175
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe project was informed of the problem early through an issue report but has not responded yet.The project was informed of the problem early through an issue report but has not responded yet.The project was informed of the problem early through an issue report but has not responded yet.The project was informed of the problem early through an issue report but has not responded yet.The project was informed of the problem early through an issue report but has not responded yet.
software_typeCloud SoftwareCloud SoftwareCloud SoftwareCloud SoftwareCloud Software
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiPPPPP
cvss2_vuldb_aiNNNNN
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_uiPPPPP
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viLLLLL
cvss4_vuldb_vaNNNNN
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_prLLLLL
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_prLLLLL
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore4.04.04.04.04.0
cvss2_vuldb_tempscore3.43.43.43.43.4
cvss3_vuldb_basescore3.53.53.53.53.5
cvss3_vuldb_tempscore3.23.23.23.23.2
cvss3_meta_basescore3.53.53.53.54.1
cvss3_meta_tempscore3.23.23.33.34.0
cvss4_vuldb_bscore5.15.15.15.15.1
cvss4_vuldb_btscore2.02.02.02.02.0
advisory_date1766876400 (12/28/2025)1766876400 (12/28/2025)1766876400 (12/28/2025)1766876400 (12/28/2025)1766876400 (12/28/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
software_vendorSohuTVSohuTVSohuTVSohuTVSohuTV
software_nameCacheCloudCacheCloudCacheCloudCacheCloudCacheCloud
software_version<=3.2.0<=3.2.0<=3.2.0<=3.2.0<=3.2.0
software_filesrc/main/java/com/sohu/cache/web/controller/AppController.javasrc/main/java/com/sohu/cache/web/controller/AppController.javasrc/main/java/com/sohu/cache/web/controller/AppController.javasrc/main/java/com/sohu/cache/web/controller/AppController.javasrc/main/java/com/sohu/cache/web/controller/AppController.java
software_functionappCommandAnalysisdoAppList/appCommandAnalysisdoAppList/appCommandAnalysisdoAppList/appCommandAnalysisdoAppList/appCommandAnalysis
vulnerability_cweCWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)CWE-79 (କ୍ରସ୍ ସାଇଟ୍ ସ୍କ୍ରିପ୍ଟିଂ)
vulnerability_risk11111
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cve_nvd_summaryA vulnerability was detected in SohuTV CacheCloud up to 3.2.0. Affected by this issue is the function doAppList/appCommandAnalysis of the file src/main/java/com/sohu/cache/web/controller/AppController.java. Performing manipulation results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. Affected by this issue is the function doAppList/appCommandAnalysis of the file src/main/java/com/sohu/cache/web/controller/AppController.java. Performing manipulation results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. Affected by this issue is the function doAppList/appCommandAnalysis of the file src/main/java/com/sohu/cache/web/controller/AppController.java. Performing manipulation results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
cvss4_cna_avNNN
cvss4_cna_acLLL
cvss4_cna_atNNN
cvss4_cna_prLLL
cvss4_cna_uiPPP
cvss4_cna_vcNNN
cvss4_cna_viLLL
cvss4_cna_vaNNN
cvss4_cna_scNNN
cvss4_cna_siNNN
cvss4_cna_saNNN
cvss4_cna_bscore5.15.15.1
cvss3_cna_avNNN
cvss3_cna_acLLL
cvss3_cna_prLLL
cvss3_cna_uiRRR
cvss3_cna_sUUU
cvss3_cna_cNNN
cvss3_cna_iLLL
cvss3_cna_aNNN
cvss3_cna_basescore3.53.53.5
cvss2_cna_avNNN
cvss2_cna_acLLL
cvss2_cna_auSSS
cvss2_cna_ciNNN
cvss2_cna_iiPPP
cvss2_cna_aiNNN
cvss2_cna_basescore444
euvd_idEUVD-2025-205557EUVD-2025-205557
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prL
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_nvd_basescore5.4

Interested in the pricing of exploits?

See the underground prices here!