CVE-2025-48799.zip
4.5 KB
CVE-2025-48799
Author: mrk336

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

GitHub Link:
https://github.com/mrk336/CVE-2025-48799
CVE-2025-24201.zip
1.1 MB
CVE-2025-24201
Author: 5ky9uy

An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).

GitHub Link:
https://github.com/5ky9uy/glass-cage-i18-2025-24085-and-cve-2025-24201
CVE-2017-9841.zip
199.5 KB
CVE-2017-9841
Author: drcrypterdotru

Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

GitHub Link:
https://github.com/drcrypterdotru/PHPUnit-GoScan
CVE-2025-24813.zip
136.4 KB
CVE-2025-24813
Author: drcrypterdotru

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT

If all of the following were true,...
CVE-2015-9251.zip
2.9 KB
CVE-2015-9251
Author: wakefulblock262

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

GitHub Link:
https://github.com/wakefulblock262/CVE-2015-9251
CVE-2025-24813.zip
136.4 KB
CVE-2025-24813
Author: drcrypterdotru

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT

If all of the following were true,...
CVE-2015-9251.zip
2.9 KB
CVE-2015-9251
Author: wakefulblock262

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.

GitHub Link:
https://github.com/wakefulblock262/CVE-2015-9251
CVE-2017-9841.zip
199.5 KB
CVE-2017-9841
Author: drcrypterdotru

Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.

GitHub Link:
https://github.com/drcrypterdotru/PHPUnit-GoScan
CVE-2025-48799.zip
4.5 KB
CVE-2025-48799
Author: mrk336

Improper link resolution before file access ('link following') in Windows Update Service allows an authorized attacker to elevate privileges locally.

GitHub Link:
https://github.com/mrk336/CVE-2025-48799
CVE-2025-24201.zip
1.1 MB
CVE-2025-24201
Author: 5ky9uy

An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).

GitHub Link:
https://github.com/5ky9uy/glass-cage-i18-2025-24085-and-cve-2025-24201
CVE-2025-0309.zip
115.1 KB
CVE-2025-0309
Author: AmberWolfCyber

An insufficient validation on the server connection endpoint in Netskope Client allows local users to elevate privileges on the system. The insufficient validation allows Netskope Client to connect to any other server with Public Signed CA TLS certificates and send specially crafted responses to elevate privileges.

GitHub Link:
https://github.com/AmberWolfCyber/UpSkope
CVE-2025-34040.zip
2.4 KB
CVE-2025-34040
Author: jisi-001

An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server.

GitHub Link:
https://github.com/jisi-001/CVE-2025-34040Exp