Metrics
Affected Vendors & Products
Mon, 10 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 08 Mar 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in user-xiangpeng yaoqishan up to a47fec4a31cbd13698c592dfdc938c8824dd25e4. It has been declared as critical. Affected by this vulnerability is the function getMediaLisByFilter of the file cn/javaex/yaoqishan/service/media_info/MediaInfoService.java. The manipulation of the argument typeId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | user-xiangpeng yaoqishan MediaInfoService.java getMediaLisByFilter sql injection | |
Weaknesses | CWE-74 CWE-89 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-03-08T21:31:04.169Z
Updated: 2025-03-10T15:54:47.625Z
Reserved: 2025-03-08T07:21:30.772Z
Link: CVE-2025-2112

Updated: 2025-03-10T15:54:41.935Z

Status : Awaiting Analysis
Published: 2025-03-08T22:15:36.443
Modified: 2025-03-10T16:15:13.817
Link: CVE-2025-2112

No data.