Exploits from Github
537 subscribers
1 photo
626 files
3.56K links
Download Telegram
CVE-2025-24813
Author: CEAlbez

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT

If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial

GitHub Link:
https://github.com/CEAlbez/CVE-2025-24813-PoC
CVE-2025-27591.zip
2.8 KB
CVE-2025-27591
Author: HOEUN-Visai

A privilege escalation vulnerability existed in the Below service prior to v0.9.0 due to the creation of a world-writable directory at /var/log/below. This could have allowed local unprivileged users to escalate to root privileges through symlink attacks that manipulate files such as /etc/shadow.

GitHub Link:
https://github.com/HOEUN-Visai/CVE-2025-27591-below-
🔥1
CVE-2021-23017.zip
7.5 KB
CVE-2021-23017
Author: 6lj

A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.

GitHub Link:
https://github.com/6lj/EVIL-CVE-2021-23017-Update-2025
CVE-2025-24204.zip
255.1 KB
CVE-2025-24204
Author: 34306

The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.4. An app may be able to access protected user data.

GitHub Link:
https://github.com/34306/decrypted