Overview
Description
Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0.
Statistics
- 3 Posts
- 1 Interaction
Last activity: 3 hours ago
Fediverse
CVE-2025-14847 (MongoBleed): MongoDB mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client
PoC: https://github.com/joe-desimone/mongobleed
Credit: youtube.com/@S0n1c-AFK
Bluesky
MongoBleed: Critical MongoDB Vulnerability CVE-2025-14847 - custom Nuclei template (see below) designed to deterministically and safely detect if a MongoDB server is vulnerable to CVE-2025-14847, without exfiltrating data.
Overview
- Apache Software Foundation
- Apache NuttX RTOS
01 Jan 2026
Published
01 Jan 2026
Updated
CVSS
Pending
EPSS
0.02%
KEV
Description
Use After Free vulnerability was discovered in fs/vfs/fs_rename code of the Apache NuttX RTOS, that due recursive implementation and single buffer use by two different pointer variables allowed arbitrary user provided size buffer reallocation and write to the previously freed heap chunk, that in specific cases could cause unintended virtual filesystem rename/move operation results.
This issue affects Apache NuttX RTOS: from 7.20 before 12.11.0.
Users of virtual filesystem based services with write access especially when exposed over the network (i.e. FTP) are affected and recommended to upgrade to version 12.11.0 that fixes the issue.
Statistics
- 1 Post
- 1 Interaction
Last activity: 12 hours ago
Overview
Description
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Statistics
- 2 Posts
- 1 Interaction
Last activity: 12 hours ago
Bluesky
URGENT: #Fedora 43 patches nginx memory disclosure flaw CVE-2025-53859 in nginx-mod-fancyindex. Impacts ngx_mail_smtp_module. Read more: 👉 tinyurl.com/3jfjdtn5
Overview
- F5
- F5OS - Appliance
15 Oct 2025
Published
16 Oct 2025
Updated
CVSS v3.1
MEDIUM (4.1)
EPSS
0.03%
KEV
Description
A vulnerability exists in F5OS-A software that allows a highly privileged authenticated attacker to access sensitive FIPS hardware security module (HSM) information on F5 rSeries systems. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Statistics
- 1 Post
- 1 Interaction
Last activity: 14 hours ago
Overview
Description
n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.
Statistics
- 1 Post
- 1 Interaction
Last activity: 16 hours ago
Overview
- Plainware
- Locatoraid Store Locator
- locatoraid
31 Dec 2025
Published
31 Dec 2025
Updated
CVSS v3.1
MEDIUM (5.9)
EPSS
0.03%
KEV
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plainware Locatoraid Store Locator allows Stored XSS.This issue affects Locatoraid Store Locator: from n/a through 3.9.65.
Statistics
- 1 Post
Last activity: 8 hours ago
Bluesky
Overview
Description
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
Statistics
- 2 Posts
Last activity: 5 hours ago
Fediverse
Aww, libslirp can’t be exploited by CVE-1999-0001 (OpenBSD patch), as far as I can tell after spending a month researching the CVE and a whole day testing libslirp.
Overview
- PrestaShopCorp
- ps_checkout
16 Oct 2025
Published
17 Oct 2025
Updated
CVSS v3.1
CRITICAL (9.1)
EPSS
0.05%
KEV
Description
PrestaShop Checkout is the PrestaShop official payment module in partnership with PayPal. Starting in version 1.3.0 and prior to versions 4.4.1 and 5.0.5, missing validation on the Express Checkout feature allows silent login, enabling account takeover via email. The vulnerability is fixed in versions 4.4.1 and 5.0.5. No known workarounds exist.
Statistics
- 1 Post
Last activity: 4 hours ago