Public technical advisories by ReverseForge — responsibly disclosed.
These are the three most recent vulnerabilities we have uncovered and fully documented.
ID assignments are pending; internal tracking codes are used until MITRE publishes the CVE.
| # | Identifier | Affected Product | Severity | Type |
|---|---|---|---|---|
| 1 | CVE-2026-3291 | Samsung Print Service Plugin | Medium (6.9) | Information Disclosure |
| 2 | CVE-2025-63757 | FFMPEG | High (7.5) | Integer overflow - Potential to heap overflow |
| 3 | CVE-2025-50681 | igmpproxy | Medium (5.4) | DOS |
🔒 Full technical details will appear in the writeups/ folder after the coordinated disclosure process is complete.
👉 Read our full disclosure policy in the organization.
| Path | What's inside |
|---|---|
writeups/ |
Individual advisory files — one .md per vulnerability, following a strict template. |
assets/ |
Proof‑of‑concept scripts, screenshots, and diagrams referenced in writeups. |
templates/ |
The reusable advisory template that guarantees consistency. |
README.md |
This file. |
.gitignore |
Prevents OS/IDE junk from being committed. |
Everything is kept minimal and action‑oriented — no duplication of organization‑level content.
ReverseForge is a two‑person security research cell.
For more about the team, our mission, and the tools we use, visit the organization profile.
📧 Contact: team@reverseforge.dev
"We don't break software. We forge its weaknesses into strengths for defenders."
— ReverseForge