24h | 7d | 30d

Overview

  • Linux
  • Linux

22 Apr 2026
Published
04 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.98%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 27 Posts
  • 28 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Heise berichtet: Die Linux-Lücke „Copy Fail“ (CVE-2026-31431) wird bereits aktiv ausgenutzt — lokaler Root-Zugriff. Admins sollten sofort verfügbare Kernel-Updates/Packages einspielen. Details & PoC: heise.de/news/Linux-Luecke-Cop 🔥🛡️🐧 #Linux #Security #CVE202631431

Edit/Korrektur: Laut @giggls
ist ein Container-Escape nicht möglich.

  • 3
  • 1
  • 0
  • 13h ago
Profile picture fallback

Kritische #Kernel #Lücke bedroht zahlreiche #Linux Systeme - #fosstopia

#IT #Security #Forscher haben eine schwere #Schwachstelle im #Linux_Kernel offengelegt (CVE-2026-31431). Die Lücke trägt den Namen Copy Fail und erlaubt lokalen Nutzern den Zugriff auf höchste Systemrechte (root). Angreifer können gezielt vier Bytes in den Seitencache beliebiger Dateien schreiben und so die Kontrolle über ein System übernehmen...

fosstopia.de/kritische-kernel-

  • 2
  • 0
  • 0
  • Last hour
Profile picture fallback

Security teams: "Copy Fail" (CVE-2026-31431) is now being exploited — a local→root Linux kernel LPE affecting many distros since 2017. Patches are available; update immediately. Details: heise.de/en/news/Linux-vulnera 🚨🛡️ #Linux #infosec #CVE202631431

  • 1
  • 1
  • 0
  • 13h ago
Profile picture fallback

Heads up: CVE-2026-31431 (Copy Fail) is a kernel crypto vulnerability affecting Rocky Linux. Our community is on it: tracking patches and sharing Rocky-specific guidance as it develops.

If you're running Rocky in production, check the forum thread for the latest:

forums.rockylinux.org/t/cve-20
#RockyLinux #LinuxSecurity #OpenSource

  • 0
  • 7
  • 0
  • 7h ago
Profile picture fallback

Copy.fail: a small Linux kernel bug with an unusually big blast radius jorijn.com/en/blog/copy-fail-c

  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback

"CISA flags actively exploited ‘Copy Fail’ Linux kernel flaw enabling root takeover across major distros — unpatched systems may remain vulnerable to attack"

"CISA warns of the actively exploited “Copy Fail” Linux flaw (CVE-2026-31431), enabling root access, with a public exploit released before patches were ready."

tomshardware.com/software/linu

  • 0
  • 1
  • 0
  • 3h ago
Profile picture fallback

CVE-2026-31431, also known as CopyFail, is a Local Privilege Escalation (LPE) vulnerability in which an attacker can escalate an already compromised and authenticated standard user to root privileges, which are the highest privileges on the host. This vulnerability affects most popular Linux distributions, as well as many virtualized and hardware environments where Linux is present.

The vulnerability is present in the algif_aead module of the Linux kernel, which is responsible for hardware-accelerated cryptography. Canonical, the company behind Ubuntu, pushed out an update that disables the algif_aead module to mitigate the CopyFail vulnerability, however, Canonical notes that this mitigation will not be necessary once the kernel is updated.

Disabling the affected module should make applications fallback from hardware-accelerated cryptography to userspace cryptographic functions. However, because of the complexity and variation of configurations across many environments, it is recommended to test this mitigation in staging first, as some applications may not include or support userspace cryptographic functions. A reboot is also recommended to complete the mitigation, as some applications may require a reboot to trigger the fallback.

To protect systems running Ubuntu and Ubuntu-based distributions against this vulnerability, follow the steps below:

Open a terminal and type:

1. apt changelog kmod

This checks the changelog for the version of the kmod tool currently installed on your system and shows a list of changes, which will confirm whether the CopyFail vulnerability was mitigated. Check the top entry to confirm the mitigation, as shown in the attached screenshot, if the top entry mentions "* Disable loading of algif_aead module to mitigate CVE-2026-31431", you already have the update installed that mitigates the CopyFail vulnerability but if there is no mention of the CVE, continue with the steps below.

2. sudo apt-get update

This will update your package index files so you can install newly released updates.

3. sudo apt-get install --only-upgrade kmod

This command will upgrade only kmod, a tool used to configure kernel modules on Ubuntu, the new release contains the mitigation for your current kernel.

4. sudo reboot

This will reboot the operating system.

5. apt changelog kmod

Repeat the command from the first step to confirm whether the mitigation is in place. The top entry should now say "* Disable loading of algif_aead module to mitigate CVE-2026-31431".

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-31431, a Linux root access bug also known as Copy Fail, to its Known Exploited Vulnerabilities catalog due to active exploitation. This privilege escalation flaw allows unprivileged local users to gain root access by corrupting the kernel's page cache, posing a significant risk to cloud and containerized environments.
thehackernews.com/2026/05/cisa

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback

@clock

I don't know if this helps, but I don't see your kernel listed here: debiansupport.com/blog/copy-fa

Edit to add that I also have not seen any differentiation between arm and x86_64 vulnerabilities (in general, not just pi-related).

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

@clock whilst I was doom-scrolling, this popped up from a few hours ago. I kinda think you're ok since you're on 6.x.

explains.social/@veronica/stat

also:
security-tracker.debian.org/tr

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

60 Sekunden Cyber KW18 2026, 27. April - 3. Mai:

Daten von Kunden und Benutzern von Vimeo werden von der Gruppierung ShinyHunters ins Dark Net gestellt, Sicherheitsforscher finden mit Copy Fail eine seit 2017 (!) bestehende Schwachstelle (CVE-2026-31431), mit der man root-Zugriff auf allen bekannteren Linux-Distributionen erhalten kann, das NGO noyb klagt gegen die Hamburger

60-sekunden-cyber.de/kw18-2026/

#cyber #cybersicherheit #itsicherheit #itsecurity #infosec #threatint #threatintel #news #update

  • 0
  • 0
  • 1
  • 14h ago
Profile picture fallback

copy.fail (CVE-2026-31431): a small Linux kernel bug with an unusually big blast radius | Jorijn Schrijvershof jorijn.com/en/blog/copy-fail-c

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

"CopyFail" (CVE-2026-31431) : un utilisateur local sans privilège peut écrire 4 bytes contrôlés dans le cache de TOUT fichier lisible ➡️ élévation root. Si vous avez du multi-tenant, des conteneurs, des CI runners non fiables : mettre à jour. Ordinateur perso ? Moins urgent mais mettez à jour quand même.

L'article : xint.io/blog/copy-fail-linux-d (en)

Le site : copy.fail/ (en)
#linux #cybersecurity

  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback

security-tracker.debian.org/tr

« In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly. »

#cve #debian #cybersecurity

  • 0
  • 0
  • 0
  • 13h ago

Bluesky

Profile picture fallback
Kernel crypto vulnerability alert: CVE-2026-31431 (Copy Fail) affects Rocky Linux users. Our community is tracking patches and next steps in real time. Rocky-specific guidance: forums.rockylinux.org/t/cve-2026-3... #RockyLinux #LinuxSecurity
  • 1
  • 6
  • 0
  • 7h ago
Profile picture fallback
The latest update for #Mendit includes "PhantomRaven Wave 5: New Undocumented NPM #SupplyChain Campaign Targets DeFi, #Cloud, and AI Developers" and "CVE-2026-31431 (Copy Fail): #Linux Kernel LPE". #CyberSecurity #DevOps #OpenSource #Compliance https://opsmtrs.com/3zEYo7d
  • 0
  • 3
  • 0
  • 18h ago
Profile picture fallback
WSL2+Docker環境における、CVE-2026-31431 (Copy Fail) への対策メモ https://zenn.dev/user_thebigslee/articles/41b570658f911b
  • 0
  • 1
  • 0
  • 16h ago
Profile picture fallback
「Copy Fail」Linux バグ:732バイトのスクリプトで2017年以降のほぼすべてのディストリビューションにて root 権限の取得が可能に - BigGo ニュース Linux カーネルにおける「Copy Fail」と命名された CVE-2026-31431 という深刻な論理ベースの脆弱性は、オープンソースおよびクラウドコンピューティングの ... biggo.jp/news/2026050...
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV reconbee.com/cisa-adds-ac... #CISA #linuxrootaccess #CVE #Linuxroot #cyberattack
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
CVE-2026-31431:我用 DeepSeek 复现了 AI 发现Copy Fail 提权的全过程 - CVE-2026-31431: I used DeepSeek to reproduce the entire process of AI detecting Copy Fail privilege escalation.
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
CISA reports active exploitation of "Copy Fail" Linux kernel flaw (CVE-2026-31431) allowing local users to gain root access. Federal agencies must patch by May 15 under BOD 22-01. #LinuxKernel #RootAccess #USA
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
**Linux Security Alert! ** The 'Copy Fail' (CVE-2026-31431) flaw lets ANY local user gain root access on SUSE & other distros. Read more-> tinyurl.com/mr5e2y7d #SUSE #Security
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
CISA ajoute la faille Linux CVE-2026-31431, exploitée en local pour escalade de privilèges, à son catalogue KEV. Plusieurs distrib Linux sont concernées. Restez vigilants ! 🔒🐧 #CyberSecurity #calimeg
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
CVE-2026-31431: perché Linux Copy Fail preoccupa Una vulnerabilità nel kernel Linux, presente dal 2017, consente escalation a root manipolando la page cache. CISA e altri sogge... https://www.ilsoftware.it/vulnerabilita-linux-copy-fail-cve-2026-31431/
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
CVE-2026-31431: Copy Fail vulnerability enables Linux root privilege escalation across cloud environments
  • 0
  • 0
  • 0
  • Last hour

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
04 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
28.36%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 14 Posts
  • 4 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

cPanel zero-day active:
40K+ servers hit
CVE-2026-41940
→ auth bypass
→ admin access
Patch immediately.

Source: securityweek.com/over-40000-se

Follow @technadu

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

🚨 In this week’s newsletter, we cover CVE-2026-41940, a cPanel & WHM authentication bypass that puts entire hosting environments at risk. We break down how it enables admin access and what defenders should do next.

Read the full analysis and protect your systems 👉 crowdsec.net/vulntracking-repo

  • 0
  • 0
  • 1
  • 7h ago
Profile picture fallback

📰 cPanel Zero-Day Auth Bypass (CVE-2026-41940) Actively Exploited for Months Before Patch

🚨 CRITICAL ZERO-DAY 🚨 cPanel & WHM auth bypass (CVE-2026-41940, CVSS 9.8) exploited for months before patch! Unauthenticated attackers can get root access. 1.5M instances exposed. Patch NOW! #cPanel #ZeroDay #CVE #WebHosting

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback

Cyber Journaal S02E53: cPanel CVE-2026-41940 leidde tot 44.000 gecompromitteerde installaties, ShinyHunters lekte 215.600 Aman Resorts accounts en Raptor Supplies Nederland staat op het darkweb.

ccinfo.nl/journaal/3150984_cpa

#cybersecurity #datalek #infosec

  • 0
  • 0
  • 0
  • 5h ago

Bluesky

Profile picture fallback
Multiple threat actors actively exploit cPanel vulnerability (CVE-2026-41940) 📖 Read more: www.helpnetsecurity.com/2026/05/04/m... #cybersecurity #cybersecuritynews #cPanel #CVE #botnet #cyberespionage #malware #ransomware #webhosting @shadowserver.bsky.social @censys.bsky.social
  • 1
  • 1
  • 0
  • 9h ago
Profile picture fallback
A critical cPanel authentication bypass vulnerability (CVE-2026-41940) is being exploited in widespread "Sorry" ransomware attacks days after the release of an emergency update. www.bleepingcomputer.com/news/securit...
  • 0
  • 2
  • 0
  • 13h ago
Profile picture fallback
⚠️ Ransomware Sorry Les instances cPanel sont actuellement ciblées. Les pirates exploitent la faille critique CVE-2026-41940 pour ensuite chiffrer les fichiers du serveur Linux avec le ransomware Sorry. Plus d'infos 👇 - www.it-connect.fr/linux-les-do... #linux #cpanel #ransomware
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
CVE-2026-41940: Il Bug CRLF di cPanel che ha Consegnato 44.000 Server al Ransomware “Sorry” il blog: insicurezzadigitale.com/cve-2026-419... #cybersecurity #infosec #ransomware #zeroday
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Over 40,000 servers have been compromised due to a critical cPanel zero-day vulnerability, CVE-2026-41940, allowing unauthorized administrative access.
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
cPanel Under Siege: CVE-2026-41940’s Perfect Storm – Unauthenticated Root Takeover via a Simple CRLF Injection + Video Introduction A critical authentication bypass vulnerability, identified as CVE-2026-41940 and carrying a near‑max CVSS score of 9.8, has been actively exploited since at least 23…
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Cyber Journaal S02E53: cPanel CVE-2026-41940 leidde tot 44.000 gecompromitteerde installaties na een zero day van twee maanden, ShinyHunters lekte 215.600 Aman Resorts accounts via vishing op de helpdesk, en Raptor Supplies Nederland staat op het darkweb. ➤ www.ccinfo.nl/journaal/315...
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
📢 Entités militaires sud-est asiatiques ciblées via CVE-2026-41940 (cPanel) avec exfiltration de données chinoises 📝 ## 🔍 C… https://cyberveille.ch/posts/2026-05-04-entites-militaires-sud-est-asiatiques-ciblees-via-cve-2026-41940-cpanel-avec-exfiltration-de-donnees-chinoises/ #AdaptixC2 #Cyberveille
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: (CVE-2026-41940) cPanel & WHM Authentication Bypass via CRLF Injection" and "Emerging Threat: (CVE-2026-3854) #GitHub Enterprise Server RCE via Git Push Injection". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it. A rogue DHCP server may be able to execute arbirary code as root on a system running dhclient.

Statistics

  • 3 Posts
  • 4 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture fallback

FreeBSD DHCP Client Flaw CVE-2026-42511 Allows Root Code Execution via Rogue DHCP Server
#CyberSecurity
securebulletin.com/freebsd-dhc

  • 4
  • 0
  • 0
  • 11h ago

Bluesky

Profile picture fallback
CVE-2026-42511: Critical FreeBSD DHCP Flaw Grants Attackers Root Access – Patch Now! + Video Introduction: The Dynamic Host Configuration Protocol (DHCP) automates IP address assignment on networks, but a newly disclosed vulnerability in FreeBSD’s default IPv4 DHCP client (dhclient) flips this…
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
~Cybergcca~ CCCS released 5 advisories covering critical updates for IBM, Dell, FreeBSD, Ubuntu, and CISA ICS products. - IOCs: CVE-2026-42511, CVE-2026-7270, CVE-2026-7164 - #PatchManagement #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
30 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
7.19%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 15 hours ago

Fediverse

Profile picture fallback
[RSS] A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202

https://www.akamai.com/blog/security-research/2026/apr/incomplete-patch-apt28s-zero-day-cve-2026-32202
  • 1
  • 0
  • 0
  • 15h ago

Bluesky

Profile picture fallback
[RSS] A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202 www.akamai.com -> Original->
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • GeoVision Inc.
  • GV-VMS V20.0.2

04 May 2026
Published
04 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.16%

KEV

Description

GV-VMS V20 is a Video Monitoring Software used to gather the feeds of many surveillance cameras and manage other security devices. It is a native application accessed locally, but it is also possible to enable remote access via the "WebCam Server" feature. Once enabled, it is possible to access to the management and monitoring feature via a regular Web interface. This webersever is another native application, compiled without ASLR, which makes exploitation much easier and more likely. Most of the features require authentication before being reachable and leverage a standard login page to grant access. However the `gvapi` endpoint uses its own authentication mechanism via an `HTTP Authorization` header. It supports both `Basic` authentication and the `Digest` modes of authentication.   #### Stack-overflow via unbound copy of base64 decoded string The `b64decoder` string is sized dynamically, but it is then copied to the `Buffer` stack variable one character at the time at [0], and there's no bound-check. As such, if the decoded string is bigger than 256 characters (the size of the `Buffer` variable) then a stack overflow occurs. Because the data can be fully controlled by an attacker and lack of ASLR, this vulnerability can easily be exploited to gain full code execution as SYSTEM on the machine running the service.

Statistics

  • 2 Posts

Last activity: 13 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-42369 (CRITICAL, CVSS 10): GeoVision GV-VMS V20.0.2 stack overflow in gvapi endpoint lets unauthenticated remote attackers execute code as SYSTEM. Restrict remote access, monitor for patches. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Bluesky

Profile picture fallback
🚨 Critical flaw in CVE-2026-42369 affects GeoVision GV-VMS V20 (CVSS 10.0). Unauthenticated attackers can gain full SYSTEM access via the WebCam Server. 🔗 basefortify.eu/cve_reports/... #CVE #CyberSecurity #GeoVision
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Progress Software
  • MOVEit Automation

30 Apr 2026
Published
01 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass. This issue affects MOVEit Automation: from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0.

Statistics

  • 3 Posts

Last activity: 3 hours ago

Bluesky

Profile picture fallback
Critical MOVEit Automation auth bypass vulnerability fixed (CVE-2026-4670) 📖 Read more: www.helpnetsecurity.com/2026/05/04/c... #CyberSecurity #CyberSecurityNews #CVE
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Progress Software alerts on critical MOVEit Automation auth bypass (CVE-2026-4670) affecting versions before 2025.1.5, enabling remote unauthenticated attacks. Over 1,400 instances found, including US gov systems. #MOVEitFlaw #AuthBypass #USA
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Progress patches critical MOVEit Automation flaws CVE-2026-4670 (auth bypass, CVSS 9.8) and CVE-2026-5174 (input validation, CVSS 7.7) allowing unauthorized admin access. Fixes released for versions <=2025.1.4. #MOVEit #Airbus #Vulnerability
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • argoproj
  • Argo CD

02 May 2026
Published
04 May 2026
Updated

CVSS v3.1
HIGH (7.7)
EPSS
0.01%

KEV

Description

In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows reading cleartext Kubernetes Secret data.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback

Read-only ArgoCD access + one annotation = every Kubernetes secret in the cluster, plaintext. CVE-2026-43824. Fixed in 3.2.11 and 3.3.9. If you're running 3.2.x or 3.3.x, upgrade today.

  • 1
  • 1
  • 0
  • 10h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback
  • 1
  • 1
  • 1
  • 10h ago

Overview

  • GeoVision Inc.
  • GV-LPC2011/LPC2211

04 May 2026
Published
04 May 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.07%

KEV

Description

A privilege escalation vulnerability exists in the Web Interface functionality of GeoVision LPC2011/LPC2211 1.10. A specially crafted HTTP request can lead to execute priviledged operation. An attacker can visit a webpage to trigger this vulnerability.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 12 hours ago

Fediverse

Profile picture fallback

🌐 CVE-2026-42368 | CRITICAL privilege escalation in GeoVision GV-LPC2011/LPC2211 v1.10. Remote attackers can gain full control via crafted HTTP requests. No patch — restrict web interface access & monitor traffic. Details: radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 12h ago

Overview

  • @fastify/accepts-serializer
  • @fastify/accepts-serializer

04 May 2026
Published
04 May 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

@fastify/accepts-serializer cached serializer-selection results keyed by the request Accept header without a size limit or eviction policy. A remote unauthenticated client could send many distinct but matching Accept header variants to make the cache grow unbounded, eventually exhausting the Node.js heap and crashing the process. Versions <= 6.0.3 are affected. Update to 6.0.4 or later, which bounds the cache via an LRU with a default size of 100 entries, configurable through the new cacheSize plugin option.

Statistics

  • 2 Posts

Last activity: 3 hours ago

Bluesky

Profile picture fallback
🚨 High-severity security fix in @fastify/accepts-serializer@6.0.4 just released! Patches CVE-2026-7768 — vulnerable to Denial of Service via Unbounded Accept Header Cache Growth github.com/fastify/fast...
  • 0
  • 0
  • 1
  • 3h ago
Showing 1 to 10 of 32 CVEs