CVE-2025-29927.zip
122.9 KB
CVE-2025-29927
Author: liamromanis101

Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.

GitHub Link:
https://github.com/liamromanis101/CVE-2025-29927-NextJS
CVE-2021-21551.zip
4.4 KB
CVE-2021-21551
Author: bengabay1994

Dell dbutil23.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.

GitHub Link:
https://github.com/bengabay1994/cve-2021-21551-PoC
CVE-2023-46747.zip
5.8 KB
CVE-2023-46747
Author: Razzlemouse




Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated



GitHub Link:
https://github.com/Razzlemouse/F5-BIG-IP-CVE-2023-46747---Unauthenticated-RCE-Reverse-Shell-Nuclei-Template-Modified-
CVE-2024-32019.zip
2.5 KB
CVE-2024-32019
Author: justjoeyking

Netdata is an open source observability tool. In affected versions the ndsudo tool shipped with affected versions of the Netdata Agent allows an attacker to run arbitrary programs with root permissions. The ndsudo tool is packaged as a root-owned executable with the SUID bit set. It only runs a restricted set of external commands, but its search paths are supplied by the PATH environment variable. This allows an attacker to control where ndsudo looks for these commands, which may be a path the attacker has write access to. This may lead to local privilege escalation. This vulnerability has been addressed in versions 1.45.3 and 1.45.2-169. Users are advised to upgrade. There are no known workarounds for this vulnerability.

GitHub Link:
https://github.com/justjoeyking/CVE-2024-32019-ndsudo
CVE-2025-38001.zip
6.6 KB
CVE-2025-38001
Author: boeseejykbtanke348

In the Linux kernel, the following vulnerability has been resolved:

netsched: hfsc: Address reentrant enqueue adding class to eltree twice

Savino says:
"We are writing to report that this recent patch
(141d34391abbb315d68556b7c67ad97885407547) [1]
can be bypassed, and a UAF can still occur when HFSC is utilized with
NETEM.

The patch only checks the cl->cl
nactive field to determine whether
it is the first insertion or not 2, but this field is only
incremented by initvf [3].

By using HFSC
RSC (which uses inited) [4], it is possible to bypass the
check and insert the class twice in the eltree.
Under normal conditions, this would lead to an infinite loop in
hfsc
dequeue for the reasons we already explained in this report 5.

However, if TBF is added as root qdisc and it is configured with a
ver...