24h | 7d | 30d

Overview

  • MongoDB Inc.
  • MongoDB Server

19 Dec 2025
Published
31 Dec 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
68.68%

Description

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 3 hours ago

Fediverse

Profile picture

CVE-2025-14847 (MongoBleed): MongoDB mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client

PoC: github.com/joe-desimone/mongob

Credit: youtube.com/@S0n1c-AFK

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture
MongoBleed: Critical MongoDB Vulnerability CVE-2025-14847 - custom Nuclei template (see below) designed to deterministically and safely detect if a MongoDB server is vulnerable to CVE-2025-14847, without exfiltrating data.
  • 0
  • 1
  • 0
  • 19h ago
Profile picture
The latest update for #Foresiet includes "MongoBleed (CVE-2025-14847): How to Fix the Critical #MongoDB Memory Leak" and "Third-Party #RiskManagement: Best Practices and Trends". #cybersecurity #infosec https://opsmtrs.com/3J3CMGz
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Apache Software Foundation
  • Apache NuttX RTOS

01 Jan 2026
Published
01 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Use After Free vulnerability was discovered in fs/vfs/fs_rename code of the Apache NuttX RTOS, that due recursive implementation and single buffer use by two different pointer variables allowed arbitrary user provided size buffer reallocation and write to the previously freed heap chunk, that in specific cases could cause unintended virtual filesystem rename/move operation results. This issue affects Apache NuttX RTOS: from 7.20 before 12.11.0. Users of virtual filesystem based services with write access especially when exposed over the network (i.e. FTP) are affected and recommended to upgrade to version 12.11.0 that fixes the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 12 hours ago

Bluesky

Profile picture
Apache NuttX RTOS contains a critical Use After Free vulnerability (CVE-2025-48769) that allows remote attackers to crash embedded devices or manipulate files via network services like FTP
  • 0
  • 1
  • 0
  • 12h ago

Overview

  • F5
  • NGINX Plus

13 Aug 2025
Published
04 Nov 2025
Updated

CVSS v3.1
LOW (3.7)
EPSS
0.09%

KEV

Description

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 12 hours ago

Bluesky

Profile picture
URGENT: #Fedora 43 patches nginx memory disclosure flaw CVE-2025-53859 in nginx-mod-fancyindex. Impacts ngx_mail_smtp_module. Read more: 👉 tinyurl.com/3jfjdtn5
  • 0
  • 1
  • 0
  • 12h ago
Profile picture
Technical Security Bulletin: #Fedora 43 Nginx Update. The Fedora project has issued an update for nginx (1.28.1) addressing CVE-2025-53859.Read more: 👉 tinyurl.com/25jxk7xu #Security
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • F5
  • F5OS - Appliance

15 Oct 2025
Published
16 Oct 2025
Updated

CVSS v3.1
MEDIUM (4.1)
EPSS
0.03%

KEV

Description

A vulnerability exists in F5OS-A software that allows a highly privileged authenticated attacker to access sensitive FIPS hardware security module (HSM) information on F5 rSeries systems.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 14 hours ago

Bluesky

Profile picture
Critical patch for #Fedora 43: CVE-2025-53860 in nginx-mod-vts (memory leak). Nginx 1.28.1 is out. Read more: 👉 tinyurl.com/3pzxfx2a #Security
  • 0
  • 1
  • 0
  • 14h ago

Overview

  • n8n-io
  • n8n

19 Dec 2025
Published
22 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
7.78%

KEV

Description

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 16 hours ago

Bluesky

Profile picture
#ばばさん通信ダイジェスト 賛否関わらず話題になった/なりそうなものを共有しています。 NVD - CVE-2025-68613 https://nvd.nist.gov/vuln/detail/CVE-2025-68613
  • 0
  • 1
  • 0
  • 16h ago

Overview

  • Plainware
  • Locatoraid Store Locator
  • locatoraid

31 Dec 2025
Published
31 Dec 2025
Updated

CVSS v3.1
MEDIUM (5.9)
EPSS
0.03%

KEV

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plainware Locatoraid Store Locator allows Stored XSS.This issue affects Locatoraid Store Locator: from n/a through 3.9.65.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture
Unmasking CVE-2025-62140: A Deep Dive into the WordPress Store Locator Plugin XSS Threat and Modern Web App Defense + Video Introduction: The recent disclosure of CVE-2025-62140, a Stored Cross-Site Scripting (XSS) vulnerability in the WordPress Locatoraid Store Locator plugin (versions 3.9.65 and…
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Pending

04 Feb 2000
Published
01 Aug 2024
Updated

CVSS
Pending
EPSS
1.15%

KEV

Description

ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Fediverse

Profile picture

Aww, libslirp can’t be exploited by CVE-1999-0001 (OpenBSD patch), as far as I can tell after spending a month researching the CVE and a whole day testing libslirp.

  • 0
  • 0
  • 0
  • 6h ago
Profile picture
As far as I know, libslirp is the only remaining FreeBSD-derived networking stack that doesn't include the CVE-1999-0001 patch.
RTEMS, which used to have a legacy libnetworking stack forked from FreeBSD before the patch, removed that stack in 2021.

Anything else I should look at?
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • PrestaShopCorp
  • ps_checkout

16 Oct 2025
Published
17 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.05%

KEV

Description

PrestaShop Checkout is the PrestaShop official payment module in partnership with PayPal. Starting in version 1.3.0 and prior to versions 4.4.1 and 5.0.5, missing validation on the Express Checkout feature allows silent login, enabling account takeover via email. The vulnerability is fixed in versions 4.4.1 and 5.0.5. No known workarounds exist.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture
CVE-2025-61922 Decoded: How a Single PrestaShop Endpoint Could Sink Your E-Commerce Empire + Video Introduction: A critical authentication bypass vulnerability, designated CVE-2025-61922, has been uncovered in the widely used PrestaShop Checkout module. This flaw allows unauthenticated attackers…
  • 0
  • 0
  • 0
  • 4h ago
Showing 1 to 8 of 8 CVEs