#cve

27 posts · Last used 5h

Back to Timeline
@Sempf@infosec.exchange · 5h ago
I don't know what you spent your day doing, but I personally copy failed all day. https://discourse.ifin.network/t/copy-fail-732-bytes-to-root-on-every-major-linux-distributions/342/27 #cve #linux
1
0
0
@veronica@mastodon.online · 12h ago
Copy Fail (CVE-2026-31431) has just been patched on Debian 13, with kernel version 6.12.85-1 from trixie (security). https://security-tracker.debian.org/tracker/CVE-2026-31431 #CopyFail #Debian #Linux #InfoSec #CVE
15
0
16
@tankgrrl@hachyderm.io · 15h ago
No warranty implied, use at your own risk. But this short C program can check if your Linux machine is still vulnerable to Copy Fail (there's also this page with python code from our friends in Estonia https://docs.hpc.ut.ee/public/cve-2026-31431/ ) Output includes "ARE available" or "NOT available" Again: compile and run at your own risk. Don't just trust me blindly. Read the code. #CopyFail #CVE-2026-31431 ============== #include #include #include #include #include #include int main(void) { int sock; struct sockaddr_alg sa; // Prepare sockaddr_alg for AEAD/GCM memset(&sa, 0, sizeof(sa)); sa.salg_family = AF_ALG; strcpy((char *)sa.salg_type, "aead"); strcpy((char *)sa.salg_name, "gcm(aes)"); // Try to create AF_ALG socket sock = socket(AF_ALG, SOCK_SEQPACKET, 0); if (sock == -1) { perror("socket(AF_ALG, aead)"); printf("algif_aead functions are NOT available (AF_ALG socket creation failed).\n"); return 1; } // Try to bind to AEAD/GCM if (bind(sock, (struct sockaddr *)&sa, sizeof(sa)) == -1) { perror("bind(AF_ALG, aead, gcm(aes))"); printf("algif_aead functions are NOT available (bind failed).\n"); close(sock); return 1; } printf("algif_aead functions ARE available (AF_ALG AEAD bind succeeded).\n"); close(sock); return 0; }
2
0
0
@fdillanes@mastodon.uy · 19h ago
ché, cómo están haciendo con esto: https://copy.fail/#copy-fail cve-2026-31431 #ciberseguridad #CVE #linux
0
0
0
@hbrpgm@adalta.social · 1d ago

📺 https://peer.adalta.social/w/dDMBGns9RBQskqzrUaPMEv 🔗 🇩🇪🇺🇸🇫🇷 🔗 ℹ️

Die potenziellen Auswirkungen eines unentdeckten Remote-Code-Executions-Schadens sind gravierend.

#linux #security #cve #rce #lpe

0
0
0
@fooflington@infosec.exchange · 1d ago
https://copy.fail/ Local Privilege Escalation in every Linux kernel since 2017 Hopefully no one is sitting on a low-privilege RCE... #linux #security #rce #lpe #cve #CVE202631431
1
1
2
@anchore@mstdn.business · Mar 27, 2026
The CVE program averted a funding emergency, but the crises of the last few years—like the NVD stopping work in 2024 and the 2025 funding scare—have eroded trust in the existing system. The biggest takeaway from the chaos? Everyone should have a plan B. Read Josh Bressers deep dive into the current state of vulnerability identifiers, the loss of trust, and what to expect next. https://anchore.com/blog/cve-is-saved-but-theres-work-to-do/ #Cybersecurity #VulnerabilityManagement #CVE #NVD
1
0
0
@hbrpgm@adalta.social · Mar 07, 2026

📺 https://peer.adalta.social/w/c683537bbcKVWaVpqKN1qU 🔗 🇩🇪🇺🇸🇫🇷 🔗 ℹ️

Une simple requête pour un fichier de sous-titres révèle un écosystème de distribution vulnérable et potentiellement illicite.

#humor #comedy #crime #cve #drama

0
0
0
@hbrpgm@adalta.social · Mar 07, 2026

📺 https://peer.adalta.social/w/pas9kztgshirWUBGgyyexM 🔗 🇩🇪🇺🇸🇫🇷 🔗 ℹ️

A single illicit subtitle link exposes the systemic vulnerabilities and market failures of contemporary content distribution.

#humor #comedy #crime #cve #drama

0
0
0
@hbrpgm@adalta.social · Mar 07, 2026

📺 https://peer.adalta.social/w/fj8LP6M9EvayZZAn8Gn4gp 🔗 🇩🇪🇺🇸🇫🇷 🔗 ℹ️

Ein scheinbar trivialer Fehler 403 enthüllt die strukturelle Macht von Plattformen über kulturellen Zugang.

#humor #comedy #crime #cve #drama

0
0
0
@hbrpgm@adalta.social · Mar 06, 2026

📺 https://peer.adalta.social/w/wHrwgG6TbqaqZh8D2DEueW 🔗 🇩🇪🇺🇸🇫🇷 🔗 ℹ️

The ninth-generation Golf launch represents a critical strategic pivot, leveraging the Scalable Systems Platform (SSP) to offer both electric and internal combustion variants concurrently.

#cve #train #golf #golfnews #idgolf

0
0
0
@sekurakbot@mastodon.com.pl · Feb 16, 2026
Jak wtyczka do backupów w WordPress pozwalała na zdalne wykonanie kodu – CVE-2026-1357 Backupy są ważne i każdy kto choć raz padł ofiarą ataku lub spotkał się z awarią środowiska produkcyjnego wie o czym jest mowa. Do wykonywania kopii zapasowych istnieje szereg rozwiązań, zarówno darmowych jak i komercyjnych. Coraz częściej można się również spotkać ze specjalistycznymi narzędziami, jakim jest np. popularny plugin WPvivid... #WBiegu #Backup #Bugbounty #Cve #Rce #Traversal #Wordpress https://sekurak.pl/jak-wtyczka-do-backupow-w-wordpress-pozwalala-na-zdalne-wykonanie-kodu-cve-2026-1357/
0
0
0
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/szNwziYVqZLTBwCgA6NWWf 🔗 🇩🇪🇺🇸🇫🇷

Une faille d’injection de code dans le système d’aide menace la stabilité des postes de travail critiques.

#cybersecurity #security #threatintel #cve #osint

0
0
0
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/mE7ZhqmZWLS2X9HU5NGNPL 🔗 🇩🇪🇺🇸🇫🇷

A high-severity code injection flaw in KeePass’s help system, while not actively exploited, presents a tangible risk of application crashes and workflow disruption through crafted HTML content.

#cybersecurity #security #threatintel #cve #osint

0
0
0
@hbrpgm@adalta.social · Feb 12, 2026

📺 https://peer.adalta.social/w/wXivcJdGsJsNDv46vvaEjc 🔗 🇩🇪🇺🇸🇫🇷

Eine Code-Injection-Schwachstelle im Hilfesystem der Passwort-Manager-Software kann zu Anwendungsabstürzen führen, stellt jedoch ein moderates Risiko dar.

#cybersecurity #security #threatintel #cve #osint

0
0
0
@hbrpgm@adalta.social · Feb 09, 2026

📺 https://peer.adalta.social/w/ha7u8osqJ9djsMHeNLvuaH 🔗 🇩🇪🇺🇸🇫🇷

Une faille de dépassement de tampon accessible à distance compromet l’intégrité des réseaux, avec un exploit public disponible.

#infosec #vulnerability #cve #exploit #release

0
0
0
@hbrpgm@adalta.social · Feb 09, 2026

📺 https://peer.adalta.social/w/kpVddxKp2FBwhdvJ28fzU2 🔗 🇩🇪🇺🇸🇫🇷

A publicly released exploit for a critical buffer overflow in Tenda routers demands immediate action from network defenders.

#infosec #vulnerability #cve #exploit #release

0
0
0
@hbrpgm@adalta.social · Feb 09, 2026

📺 https://peer.adalta.social/w/jG6JrBKpEnD9cTemxKWzzY 🔗 🇩🇪🇺🇸🇫🇷

Ein veröffentlichter Proof-of-Concept-Exploit für einen Remote-Buffer-Overflow erhöht das Risiko für ungepatchte Netzwerke erheblich.

#infosec #vulnerability #cve #exploit #release

0
0
0
@hbrpgm@adalta.social · Feb 08, 2026

📺 https://peer.adalta.social/w/1yG6uMbdZ6ERmwL2Sfck4Q 🔗 🇩🇪🇺🇸🇫🇷

Une vulnérabilité publique et exploitée sur un équipement non maintenu représente un risque de priorité 1 pour les réseaux hérités.

#cybersecurity #security #threatintel #osint #cve

0
0
0
@hbrpgm@adalta.social · Feb 08, 2026

📺 https://peer.adalta.social/w/snU5nCd7kRYQC28d23s8xm 🔗 🇩🇪🇺🇸🇫🇷

A publicly exploitable, remote OS command injection flaw in the unmaintained D-Link DIR-615 router poses a critical risk to consumer and small office networks.

#cybersecurity #security #threatintel #osint #cve

0
0
0