Overview
- Artifex Software
- MuPDF
06 Feb 2026
Published
06 Feb 2026
Updated
CVSS v4.0
MEDIUM (5.9)
EPSS
0.06%
KEV
Description
MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_display_list() when an exception occurs during display list rendering. The function accepts a caller-owned fz_pixmap pointer but incorrectly drops the pixmap in its error handling path before rethrowing the exception. Callers (including the barcode decoding path in fz_decode_barcode_from_display_list) also drop the same pixmap in cleanup, resulting in a double-free that can corrupt the heap and crash the process. This issue affects applications that enable and use MuPDF barcode decoding and can be triggered by processing crafted input that causes a rendering-time error while decoding barcodes.
Statistics
- 1 Post
Last activity: 6 hours ago
Overview
Description
A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Statistics
- 1 Post
Last activity: 10 hours ago
Fediverse
🚨 CVE-2026-2927: HIGH-severity stack buffer overflow in D-Link DWR-M960 (v1.01.07). Remote, unauthenticated RCE risk — exploit details public. Patch or restrict access! More: https://radar.offseq.com/threat/cve-2026-2927-stack-based-buffer-overflow-in-d-lin-aa7f83a9 #OffSeq #DLink #Vuln #BlueTeam
Overview
Description
A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.
Statistics
- 1 Post
Last activity: 11 hours ago
Fediverse
CVE-2026-2928: HIGH-severity stack buffer overflow in D-Link DWR-M960 (v1.01.07) enables remote code execution — no auth needed. Public exploit code is out. Isolate & restrict access, monitor for attacks, patch ASAP. https://radar.offseq.com/threat/cve-2026-2928-stack-based-buffer-overflow-in-d-lin-ba314a06 #OffSeq #DLink #Vuln #BlueTeam
Overview
- coreruleset
- coreruleset
08 Jan 2026
Published
08 Jan 2026
Updated
CVSS v3.1
CRITICAL (9.3)
EPSS
0.05%
KEV
Description
The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.
Statistics
- 1 Post
Last activity: 3 hours ago
Overview
- Red Hat
- Red Hat Enterprise Linux 10
- libblockdev
19 Jun 2025
Published
11 Nov 2025
Updated
CVSS
Pending
EPSS
0.01%
KEV
Description
A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
Statistics
- 1 Post
Last activity: 7 hours ago
Bluesky
Overview
Description
A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.
Statistics
- 1 Post
Last activity: 7 hours ago
Bluesky
Overview
Description
coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.
Statistics
- 1 Post
Last activity: 3 hours ago