24h | 7d | 30d

Overview

  • D-Link
  • DWR-M960

22 Feb 2026
Published
22 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture fallback

🔎 HIGH severity: D-Link DWR-M960 v1.01.07 vulnerable to stack-based buffer overflow (CVE-2026-2925) via Bridge VLAN config. Remote exploit now public — monitor exposure & await patches. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
1.62%

Description

Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
RDPulse: The New Open-Source Tool Exposing Hidden RDP Risks in Your Network (CVE-2026-21533 Context) + Video Introduction Remote Desktop Protocol remains one of the most targeted attack vectors in enterprise environments, yet security teams struggle to understand how exposed RDP services actually…
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • D-Link
  • DWR-M960

22 Feb 2026
Published
22 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4237AC of the file /boafrm/formLteSetup of the component LTE Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture fallback

CVE-2026-2926: HIGH-severity stack buffer overflow in D-Link DWR-M960 v1.01.07. Remote, unauthenticated code execution possible. Public PoC released — no vendor patch yet. Isolate devices, monitor endpoints, restrict access. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • UTT
  • HiPER 810G

22 Feb 2026
Published
22 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-2904 (HIGH): Buffer overflow in UTT HiPER 810G v1.7.7-171114 via /goform/ConfigExceptAli. Remote, unauthenticated RCE/DoS risk. Public exploit code available — restrict access & monitor. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Artifex Software
  • MuPDF

06 Feb 2026
Published
06 Feb 2026
Updated

CVSS v4.0
MEDIUM (5.9)
EPSS
0.06%

KEV

Description

MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerability in fz_fill_pixmap_from_display_list() when an exception occurs during display list rendering. The function accepts a caller-owned fz_pixmap pointer but incorrectly drops the pixmap in its error handling path before rethrowing the exception. Callers (including the barcode decoding path in fz_decode_barcode_from_display_list) also drop the same pixmap in cleanup, resulting in a double-free that can corrupt the heap and crash the process. This issue affects applications that enable and use MuPDF barcode decoding and can be triggered by processing crafted input that causes a rendering-time error while decoding barcodes.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
Critical MuPDF vulnerability (CVE-2026-25556) lands for #Fedora 42. This isn't just a viewer issue—it's a DoS risk in a core parsing library. Read more: 👉 tinyurl.com/tnrw9wpn #Security
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • coreruleset
  • coreruleset

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.3)
EPSS
0.05%

KEV

Description

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
🚨 #Debian LTS DLA-4488-1: Critical ModSecurity CRS patches released Fixes 2 high-impact WAF bypasses: 🔹 CVE-2023-38199: "Content-Type confusion" attacks. 🔹 CVE-2026-21876: Multipart request parsing logic flaw. Read mroe: 👉 tinyurl.com/42jjnmt4 #Security
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • libblockdev

19 Jun 2025
Published
11 Nov 2025
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
No Kernel, No Problem: Chaining CVE-2025-6018 & CVE-2025-6019 for Root on a Patched Linux Box + Video Introduction: Modern Linux security relies on defense-in-depth, assuming that while the kernel is hardened, user-space misconfigurations can still lead to full system compromise. This article…
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Pending

13 Jul 2023
Published
30 Oct 2024
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

coreruleset (aka OWASP ModSecurity Core Rule Set) through 3.3.4 does not detect multiple Content-Type request headers on some platforms. This might allow attackers to bypass a WAF with a crafted payload, aka "Content-Type confusion" between the WAF and the backend application. This occurs when the web application relies on only the last Content-Type header. Other platforms may reject the additional Content-Type header or merge conflicting headers, leading to detection as a malformed header.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
🚨 #Debian LTS DLA-4488-1: Critical ModSecurity CRS patches released Fixes 2 high-impact WAF bypasses: 🔹 CVE-2023-38199: "Content-Type confusion" attacks. 🔹 CVE-2026-21876: Multipart request parsing logic flaw. Read mroe: 👉 tinyurl.com/42jjnmt4 #Security
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • pam

23 Jul 2025
Published
06 Nov 2025
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
No Kernel, No Problem: Chaining CVE-2025-6018 & CVE-2025-6019 for Root on a Patched Linux Box + Video Introduction: Modern Linux security relies on defense-in-depth, assuming that while the kernel is hardened, user-space misconfigurations can still lead to full system compromise. This article…
  • 0
  • 0
  • 0
  • 6h ago
Showing 11 to 19 of 19 CVEs