CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad

CVEReports
•3 minutes ago•GHSA-VFVV-C25P-M7MM
High (Unscored)

GHSA-VFVV-C25P-M7MM: Memory Corruption via Panic Safety Flaw in rkyv Collections

The rkyv zero-copy deserialization framework for Rust suffers from a panic safety vulnerability in its manual memory management logic. The flaw allows memory corruption, specifically Double Free and Use-After-Free, when element destructors panic during vector clearance.

Alon Barad
Alon Barad
0 views•5 min read
•33 minutes ago•GHSA-RC6V-5RMX-W5MV
6.5

GHSA-RC6V-5RMX-W5MV: Multi-Vector Cryptographic and State Machine Vulnerabilities in Arnika

Arnika versions prior to v1.0.1 contain multiple medium-severity vulnerabilities affecting the UDP key-rotation protocol, Post-Quantum Cryptography (PQC) key file handling, and Key Management System (KMS) TLS configuration. These flaws permit UDP replay attacks causing denial of service, silent security downgrades via empty PQC files, and Man-in-the-Middle (MITM) attacks against the KMS.

Alon Barad
Alon Barad
1 views•10 min read
•about 2 hours ago•GHSA-QXVM-R42F-5P8J
9.8

GHSA-QXVM-R42F-5P8J: Authentication Bypass via Meet Plugin in AVideo

AVideo is vulnerable to a critical authentication bypass within the Meet plugin. An attacker possessing the Meet shared secret can impersonate any user, including administrators, by supplying a crafted filename to the video upload endpoint, leading to complete system compromise.

Amit Schendel
Amit Schendel
4 views•5 min read
•about 2 hours ago•CVE-2026-46383
5.5

CVE-2026-46383: Arbitrary File Overwrite via Path Traversal (TarSlip) in Microsoft APM

A path traversal vulnerability exists in the legacy-bundle probing logic of Microsoft APM, an open-source dependency manager for AI agents. On Windows systems using Python versions prior to 3.12, this allows local attackers to overwrite arbitrary files via a crafted tarball.

Amit Schendel
Amit Schendel
3 views•5 min read
•about 4 hours ago•GHSA-MXG3-432P-MR72
8.1

GHSA-MXG3-432P-MR72: SSH Host Key Verification Disabled in goshs

A critical vulnerability in the Go-based file server goshs allows transparent Man-in-the-Middle (MITM) attacks during SSH tunnel establishment. By utilizing ssh.InsecureIgnoreHostKey() as the HostKeyCallback, versions prior to 2.0.7 fail to validate remote server identity.

Alon Barad
Alon Barad
5 views•6 min read
•about 6 hours ago•CVE-2026-23899
8.8

CVE-2026-23899: Improper Access Check in Joomla! com_config Webservices

CVE-2026-23899 is a critical authorization bypass vulnerability within the Joomla! CMS webservice API. Due to an improper access check in the com_config component, authenticated low-privileged users can read and modify the global configuration, leading to the exposure of database credentials and the application secret key.

Amit Schendel
Amit Schendel
7 views•6 min read
•about 13 hours ago•GHSA-F3CJ-J4F6-WQ85
9.1

GHSA-f3cj-j4f6-wq85: Server-Side Rendering Cross-Site Scripting in Svelte hydratable Promises

A critical Cross-Site Scripting (XSS) vulnerability exists in the Server-Side Rendering (SSR) engine of the Svelte framework. The vulnerability occurs due to insecure promise serialization within the experimental `hydratable` feature. Attackers controlling the output of a resolved promise can inject JavaScript string replacement tokens, causing the SSR engine to duplicate template strings into executable script blocks.

Alon Barad
Alon Barad
9 views•6 min read
•about 13 hours ago•GHSA-WF8Q-WVV8-P8JF
4.7

GHSA-WF8Q-WVV8-P8JF: Unauthenticated User Impersonation in MCPHub SSE Endpoint

The @samanhappy/mcphub package before version 0.12.15 contains a critical improper authentication vulnerability within its Server-Sent Events (SSE) transport layer. The application blindly trusts the username provided in the URL path parameter to establish user context and session state without requiring cryptographic verification or authentication tokens. This architectural flaw allows unauthenticated remote attackers to impersonate any user, establish a valid session, and execute arbitrary Model Context Protocol (MCP) tools within the victim's authorization context.

Amit Schendel
Amit Schendel
6 views•6 min read
•about 14 hours ago•GHSA-GXHX-2686-5H9G
7.7

GHSA-gxhx-2686-5h9g: Signature Verification Bypass in slack-go via Empty SecretsVerifier

The slack-go library prior to version 0.23.1 contains a cryptographic signature verification vulnerability. The SecretsVerifier component fails to validate whether the provided Slack signing secret is empty. Applications initializing this verifier with an empty string—such as from a missing environment variable—allow attackers to bypass request authentication by forging signatures with an empty HMAC key.

Alon Barad
Alon Barad
5 views•7 min read
•about 14 hours ago•CVE-2026-42897
8.1

CVE-2026-42897: Reflected Cross-Site Scripting in Microsoft Exchange Server OWA

CVE-2026-42897 is a high-severity reflected Cross-Site Scripting (XSS) vulnerability affecting the Outlook on the web (OWA) component of Microsoft Exchange Server. The flaw stems from improper neutralization of user-supplied input during web page generation. Discovered as a zero-day and actively exploited in the wild, the vulnerability allows unauthenticated attackers to execute arbitrary JavaScript within the security context of a targeted user's session, facilitating session hijacking and identity spoofing.

Amit Schendel
Amit Schendel
129 views•5 min read
•about 23 hours ago•CVE-2026-45369
10.0

CVE-2026-45369: OS Command Injection in python-utcp CLI Protocol

CVE-2026-45369 is a critical OS command injection vulnerability in the python-utcp library resulting from unsafe argument substitution in the CLI communication protocol. Unauthenticated attackers can execute arbitrary shell commands via specially crafted tool arguments.

Alon Barad
Alon Barad
15 views•7 min read
•about 23 hours ago•CVE-2026-45370
7.7

CVE-2026-45370: Environment Variable Leak in python-utcp CLI Subprocesses

The python-utcp library improperly exposes the host application's full environment variables to spawned subprocesses via os.environ.copy(). When combined with an existing command injection flaw, attackers can exfiltrate all host secrets in a single request.

Alon Barad
Alon Barad
11 views•6 min read
SeverityExploitPeriodCatalog
Sort

Or generate a custom report

Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis

Automated vulnerability intelligence. 1,743+ reports.