<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>CVE Deep Dives on Raizen | Blog</title><link>https://rai2en.github.io/series/cve-deep-dives/</link><description>Recent content in CVE Deep Dives on Raizen | Blog</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Rai2en</copyright><lastBuildDate>Fri, 08 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://rai2en.github.io/series/cve-deep-dives/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-31431 (Copy Fail) - Linux Kernel LPE Deep Dive</title><link>https://rai2en.github.io/posts/cve-2026-31431-copy-fail/</link><pubDate>Fri, 08 May 2026 00:00:00 +0000</pubDate><guid>https://rai2en.github.io/posts/cve-2026-31431-copy-fail/</guid><description>Analyse ultra complète de CVE-2026-31431 (Copy Fail): cause racine dans algif_aead/AF_ALG, conditions d&amp;rsquo;exploitation, impact réel, détection, mitigation et runbook de remédiation en production.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://rai2en.github.io/posts/cve-2026-31431-copy-fail/cover.png"/></item><item><title>CVE-2023-50564 - Pluck CMS v4.7.18</title><link>https://rai2en.github.io/posts/cve-2023-50564/</link><pubDate>Sun, 04 Aug 2024 00:00:00 +0000</pubDate><guid>https://rai2en.github.io/posts/cve-2023-50564/</guid><description>Découvrez la vulnérabilité CVE-2023-50564 qui affecte Pluck CMS v4.7.18, permettant une exécution de code arbitraire via un téléchargement de fichier malveillant.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://rai2en.github.io/posts/cve-2023-50564/cover.png"/></item></channel></rss>