CVEReports
Reports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Reports
  • Sitemap

Company

  • About
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Powered by Google Gemini & CVE Feed

Vulnerability Reports

Explore our collection of high-severity CVE reports and remediation guides.

about 2 hours ago•CVE-2025-69200•6 min read
7.5

The FAQ That Knew Too Much: Dissecting CVE-2025-69200

A critical failure in access control within phpMyFAQ allows unauthenticated attackers to trigger a configuration backup, resulting in the exfiltration of cleartext database credentials.

Amit Schendel
Amit Schendel
about 2 hours ago•CVE-2023-20052•6 min read
5.3

ClamAV DMG Parser XXE: When Your Antivirus Becomes the Spy

A critical XML External Entity (XXE) vulnerability in ClamAV's DMG file parser allows remote attackers to leak sensitive files from the host system by simply asking the antivirus to scan a malicious disk image.

Alon Barad
Alon Barad
about 3 hours ago•CVE-2025-69211•5 min read
6.9

The Invisible Path: Bypassing NestJS Middleware with URL Encoding

A critical normalization discrepancy in the NestJS Fastify adapter allows attackers to bypass middleware security checks simply by URL-encoding characters in the request path.

Alon Barad
Alon Barad
about 4 hours ago•CVE-2025-69202•6 min read
6.5

The Shared Hallucination: Authorization Bypass in axios-cache-interceptor

A critical failure in cache key generation allows unprivileged users to inherit the sessions of privileged users in server-side implementations of axios-cache-interceptor.

Amit Schendel
Amit Schendel
about 4 hours ago•CVE-2025-67746•5 min read
1.3

Terminal Deception: Inside CVE-2025-67746 in Composer

A deep dive into how ANSI sequence injection allows malicious PHP packages to manipulate your terminal output, hiding warnings and spoofing success messages.

Amit Schendel
Amit Schendel
about 4 hours ago•GHSA-xphh-5v4r-r3rx•5 min read
8.1

PsiTransfer Zip Slip: When 'Download All' Becomes 'Hack All'

A critical Path Traversal vulnerability in PsiTransfer allows attackers to weaponize the 'Download Archive' feature. By uploading files with malicious filenames, attackers can generate archives that perform arbitrary file overwrites on the victim's machine upon extraction.

Alon Barad
Alon Barad
about 4 hours ago•CVE-2024-6387•6 min read
8.1

regreSSHion: The Ghost of 2006 Returns to Haunt OpenSSH

A signal handler race condition in OpenSSH's server (sshd) allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems. This is a regression of a vulnerability originally patched in 2006.

Alon Barad
Alon Barad
about 4 hours ago•GHSA-6mp4-q625-mxjp•4 min read
8.2

Short Links, Long Scripts: Pwning YOURLS via JSONP

A deep dive into a Reflected Cross-Site Scripting (XSS) vulnerability in the popular YOURLS URL shortener. By exploiting legacy JSONP implementations in the API, attackers can execute arbitrary JavaScript in the context of the administrator's session.

Alon Barad
Alon Barad
about 4 hours ago•CVE-2025-69210•6 min read
1.2

Ledger Poisoning: Stored XSS in FacturaScripts (CVE-2025-69210)

A stored Cross-Site Scripting (XSS) vulnerability in the FacturaScripts ERP system allows authenticated attackers to hijack administrator sessions by uploading malicious XML or HTML files.

Amit Schendel
Amit Schendel
about 5 hours ago•CVE-2025-15284•5 min read
7.5

The Limit Does Not Exist: Crashing Node.js via CVE-2025-15284

A logic flaw in the ubiquitous `qs` library allows attackers to bypass the `arrayLimit` security control using bracket notation. This enables unauthenticated Denial of Service (DoS) attacks against Node.js applications by exhausting server memory with massive arrays.

Amit Schendel
Amit Schendel
about 5 hours ago•CVE-2025-61594•5 min read
2.7

The Clingy Credential: Ruby URI Bypass (CVE-2025-61594)

A deep dive into a credential leakage vulnerability in Ruby's standard `uri` gem, where updating a URI's host or port fails to clear sensitive user information, effectively bypassing the fix for CVE-2025-27221.

Amit Schendel
Amit Schendel
about 5 hours ago•CVE-2025-14986•5 min read
1.3

The Old Switcheroo: Bypassing Namespace Policies in Temporal (CVE-2025-14986)

A logic flaw in Temporal's `ExecuteMultiOperation` API allowed authenticated users to execute workflows in one namespace while validating them against the policies of another. By embedding a request with a mismatched namespace ID, attackers could bypass rate limits and feature gates.

Alon Barad
Alon Barad