| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-53883 | spacewalk-java has various XSS issues on search page | SUSE | Container suse manager 5.0 | - | - | 2025-10-30 10:50:08 | Deep Dive |
| CVE-2025-53880 | susemanager-tftpsync-recv allows arbitrary file creation and deletion due to path traversal | SUSE | Container suse/manager/4.3/proxy-httpd:latest | - | - | 2025-10-30 10:31:16 | Deep Dive |
| CVE-2025-8671 | CVE-2025-8671 | SUSE Linux | Enterprise Module for Development Tools | - | - | 2025-08-13 12:03:37 | Deep Dive |
| CVE-2025-46809 | Multi Linux Manager epxoses the plain text HTTP Proxy user:password in logs | SUSE | Container suse/manager/4.3/proxy-httpd:4.3.16.9.67.1 | Medium | 5.7 | 2025-07-31 15:24:42 | Deep Dive |
| CVE-2025-46811 | SUSE Multi Linux Manager allows code execution via unprotected websocket endpoint | SUSE | Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1 | Critical | 9.8 | 2025-07-30 14:20:54 | Deep Dive |
| CVE-2025-23393 | Reflected XSS in spacewalk-java | SUSE | Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1 | Medium | 5.2 | 2025-05-27 07:23:39 | Deep Dive |
| CVE-2025-23392 | Reflected XSS in SystemsController.java in spacewalk-java | SUSE | Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1 | Medium | 5.2 | 2025-05-26 16:06:26 | Deep Dive |
| CVE-2024-22037 | Database password leaked by systemd uyuni-server-attestation service | SUSE | SUSE Manager Server 5.0 | Medium | 5.5 | 2024-11-28 09:46:08 | Deep Dive |
| CVE-2024-49502 | Reflected XSS in Setup Wizard, HTTP Proxy credentials pane in spacewalk-web | SUSE | Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1 | Low | 3.5 | 2024-11-28 09:26:39 | Deep Dive |
| CVE-2024-49503 | Reflected XSS in Setup Wizard, Organization Credentials in spacewalk-web | SUSE | Container suse/manager/5.0/x86_64/server:5.0.2.7.8.1 | Low | 3.5 | 2024-11-28 09:20:03 | Deep Dive |
| CVE-2023-32189 | Insecure handling SSH key in SUSE Manager when bootstrapping new clients | SUSE | SUSE Manager Server Module 4.3 | Medium | 5.9 | 2024-10-16 13:48:39 | Deep Dive |
| CVE-2024-22029 | tomcat packaging allows for escalation to root from tomcat user | SUSE | Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122 | High | 7.8 | 2024-10-16 13:20:48 | Deep Dive |
| CVE-2022-31254 | rmt-server-pubcloud allows to escalate from user _rmt to root | SUSE | SUSE Linux Enterprise Server for SAP 15 | High | 7.8 | 2023-02-07 00:00:00 | Deep Dive |
| CVE-2022-43754 | SUMA/UYUNI reflected cross site scripting in /rhn/audit/scap/Search.do | SUSE | SUSE Linux Enterprise Module for SUSE Manager Server 4.2 | Low | 2.6 | 2022-11-10 07:30:19 | Deep Dive |
| CVE-2022-43753 | SUMA/UYUNI arbitrary file disclosure vulnerability in ScapResultDownload | SUSE | SUSE Linux Enterprise Module for SUSE Manager Server 4.2 | Medium | 4.3 | 2022-11-10 07:30:18 | Deep Dive |
| CVE-2022-31255 | SUMA/UYUNI directory path traversal vulnerability in CobblerSnipperViewAction | SUSE | SUSE Linux Enterprise Module for SUSE Manager Server 4.2 | Medium | 4.3 | 2022-11-10 07:30:17 | Deep Dive |
| CVE-2022-31248 | SUMA user enumeration via weak error message | SUSE | SUSE Manager Server 4.1 | Medium | 5.3 | 2022-06-22 10:05:13 | Deep Dive |
| CVE-2022-21952 | SUMA unauthenticated remote DoS via resource exhaustion | SUSE | SUSE Manager Server 4.1 | High | 7.5 | 2022-06-22 10:05:12 | Deep Dive |
| CVE-2019-18906 | cryptctl: client side password hashing is equivalent to clear text password storage | SUSE | SUSE Linux Enterprise Server for SAP 12-SP5 | Critical | 9.8 | 2021-06-30 08:35:12 | Deep Dive |
| CVE-2021-25321 | arpwatch: Local privilege escalation from runtime user to root | SUSE | SUSE Linux Enterprise Server 11-SP4-LTSS | High | 7.8 | 2021-06-30 08:25:13 | Deep Dive |