q1uf3ng

3 exploits Active since Jun 2025
CVE-2025-47962 NOMISEC HIGH WORKING POC
Microsoft Windows Software Development Kit - Improper Access Control
Improper access control in Windows SDK allows an authorized attacker to elevate privileges locally.
2 stars
CVSS 7.8
CVE-2025-51458 NOMISEC MEDIUM WORKING POC
DB-GPT 0.7.0 - SQL Injection
SQL Injection in editor_sql_run and query_ex in eosphoros-ai DB-GPT 0.7.0 allows remote attackers to execute arbitrary SQL statements via crafted input passed to the /v1/editor/sql/run or /v1/editor/chart/run endpoints, interacting with api_editor_v1.editor_sql_run, editor_chart_run, and datasource.rdbms.base.query_ex.
CVSS 6.5
CVE-2026-27905 WRITEUP HIGH WRITEUP
BentoML <1.4.36 - Path Traversal
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.36, the safe_extract_tarfile() function validates that each tar member's path is within the destination directory, but for symlink members it only validates the symlink's own path, not the symlink's target. An attacker can create a malicious bento/model tar file containing a symlink pointing outside the extraction directory, followed by a regular file that writes through the symlink, achieving arbitrary file write on the host filesystem. This vulnerability is fixed in 1.4.36.
CVSS 7.8