CVE-2025-48799.zip
4.5 KB
CVE-2025-48799
Author: mrk336

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

GitHub Link:
https://github.com/mrk336/CVE-2025-48799
CVE-2025-24201.zip
1.1 MB
CVE-2025-24201
Author: 5ky9uy

An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).

GitHub Link:
https://github.com/5ky9uy/glass-cage-i18-2025-24085-and-cve-2025-24201
CVE-2017-9841.zip
199.5 KB
CVE-2017-9841
Author: drcrypterdotru

Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

GitHub Link:
https://github.com/drcrypterdotru/PHPUnit-GoScan
CVE-2025-24813.zip
136.4 KB
CVE-2025-24813
Author: drcrypterdotru

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT

If all of the following were true,...
CVE-2015-9251.zip
2.9 KB
CVE-2015-9251
Author: wakefulblock262

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

GitHub Link:
https://github.com/wakefulblock262/CVE-2015-9251
CVE-2025-24813.zip
136.4 KB
CVE-2025-24813
Author: drcrypterdotru

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT

If all of the following were true,...
CVE-2015-9251.zip
2.9 KB
CVE-2015-9251
Author: wakefulblock262

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

GitHub Link:
https://github.com/wakefulblock262/CVE-2015-9251
CVE-2017-9841.zip
199.5 KB
CVE-2017-9841
Author: drcrypterdotru

Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

GitHub Link:
https://github.com/drcrypterdotru/PHPUnit-GoScan
CVE-2025-48799.zip
4.5 KB
CVE-2025-48799
Author: mrk336

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

GitHub Link:
https://github.com/mrk336/CVE-2025-48799
CVE-2025-24201.zip
1.1 MB
CVE-2025-24201
Author: 5ky9uy

An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).

GitHub Link:
https://github.com/5ky9uy/glass-cage-i18-2025-24085-and-cve-2025-24201