24h | 7d | 30d

Overview

  • Artifex Software
  • MuPDF

06 Feb 2026
Published
06 Feb 2026
Updated

CVSS v4.0
MEDIUM (5.9)
EPSS
0.06%

KEV

Description

MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_display_list() when an exception occurs during display list rendering. The function accepts a caller-owned fz_pixmap pointer but incorrectly drops the pixmap in its error handling path before rethrowing the exception. Callers (including the barcode decoding path in fz_decode_barcode_from_display_list) also drop the same pixmap in cleanup, resulting in a double-free that can corrupt the heap and crash the process. This issue affects applications that enable and use MuPDF barcode decoding and can be triggered by processing crafted input that causes a rendering-time error while decoding barcodes.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
Critical MuPDF vulnerability (CVE-2026-25556) lands for #Fedora 42. This isn't just a viewer issue—it's a DoS risk in a core parsing library. Read more: 👉 tinyurl.com/tnrw9wpn #Security
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • D-Link
  • DWR-M960

22 Feb 2026
Published
22 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-2927: HIGH-severity stack buffer overflow in D-Link DWR-M960 (v1.01.07). Remote, unauthenticated RCE risk — exploit details public. Patch or restrict access! More: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • D-Link
  • DWR-M960

22 Feb 2026
Published
22 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.03%

KEV

Description

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture fallback

CVE-2026-2928: HIGH-severity stack buffer overflow in D-Link DWR-M960 (v1.01.07) enables remote code execution — no auth needed. Public exploit code is out. Isolate & restrict access, monitor for attacks, patch ASAP. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • coreruleset
  • coreruleset

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
0.05%

KEV

Description

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
🚨 #Debian LTS DLA-4488-1: Critical ModSecurity CRS patches released Fixes 2 high-impact WAF bypasses: 🔹 CVE-2023-38199: "Content-Type confusion" attacks. 🔹 CVE-2026-21876: Multipart request parsing logic flaw. Read mroe: 👉 tinyurl.com/42jjnmt4 #Security
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • libblockdev

19 Jun 2025
Published
11 Nov 2025
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture fallback
No Kernel, No Problem: Chaining CVE-2025-6018 & CVE-2025-6019 for Root on a Patched Linux Box + Video Introduction: Modern Linux security relies on defense-in-depth, assuming that while the kernel is hardened, user-space misconfigurations can still lead to full system compromise. This article…
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • pam

23 Jul 2025
Published
06 Nov 2025
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture fallback
No Kernel, No Problem: Chaining CVE-2025-6018 & CVE-2025-6019 for Root on a Patched Linux Box + Video Introduction: Modern Linux security relies on defense-in-depth, assuming that while the kernel is hardened, user-space misconfigurations can still lead to full system compromise. This article…
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Pending

13 Jul 2023
Published
30 Oct 2024
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
🚨 #Debian LTS DLA-4488-1: Critical ModSecurity CRS patches released Fixes 2 high-impact WAF bypasses: 🔹 CVE-2023-38199: "Content-Type confusion" attacks. 🔹 CVE-2026-21876: Multipart request parsing logic flaw. Read mroe: 👉 tinyurl.com/42jjnmt4 #Security
  • 0
  • 0
  • 0
  • 3h ago
Showing 11 to 17 of 17 CVEs