浏览 36+ 条来自 NVD 与 CNNVD 的 CVE 漏洞,配 AI 中文翻译、AI POC 生成、每日情报;可按厂商、产品、严重等级、CWE 检索。
| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-8671 | CVE-2025-8671 | SUSE Linux | Enterprise Module for Development Tools | - | - | 2025-08-13 12:03:37 | Deep Dive |
| CVE-2024-22034 | Crafted projects can overwrite special files in the .osc config directory | SUSE | SUSE Linux Enterprise Desktop 15 SP5 | Medium | 5.5 | 2024-10-16 13:46:08 | Deep Dive |
| CVE-2024-22033 | obs-service-download_url is vulnerable to argument injection | SUSE | SUSE Package Hub 15 SP5 | Medium | 6.3 | 2024-10-16 13:42:47 | Deep Dive |
| CVE-2024-22029 | tomcat packaging allows for escalation to root from tomcat user | SUSE | Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122 | High | 7.8 | 2024-10-16 13:20:48 | Deep Dive |
| CVE-2023-32182 | SUSE Linux Enterprise Desktop 后置链接漏洞 | SUSE | SUSE Linux Enterprise Desktop 15 SP5 | Medium | 5.9 | 2023-09-19 15:07:03 | Deep Dive |
| CVE-2022-45153 | saphanabootstrap-formula: Escalation to root for arbitrary users in hana/ha_cluster.sls | SUSE | SUSE Linux Enterprise Module for SAP Applications 15-SP1 | High | 7.0 | 2023-02-15 00:00:00 | Deep Dive |
| CVE-2023-22643 | libzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls | SUSE | SUSE Linux Enterprise Server for SAP 15-SP3 | Medium | 6.3 | 2023-02-07 00:00:00 | Deep Dive |
| CVE-2022-31254 | rmt-server-pubcloud allows to escalate from user _rmt to root | SUSE | SUSE Linux Enterprise Server for SAP 15 | High | 7.8 | 2023-02-07 00:00:00 | Deep Dive |
| CVE-2022-31252 | permissions: chkstat does not check for group-writable parent directories or target files in safeOpen() | SUSE | SUSE Linux Enterprise Server 12-SP5 | Medium | 4.4 | 2022-10-06 17:14:05 | Deep Dive |
| CVE-2021-25321 | arpwatch: Local privilege escalation from runtime user to root | SUSE | SUSE Linux Enterprise Server 11-SP4-LTSS | High | 7.8 | 2021-06-30 08:25:13 | Deep Dive |
| CVE-2021-25322 | python-HyperKitty: hyperkitty-permissions.sh used during %post allows local privilege escalation from hyperkitty user to root | openSUSE | Leap 15.2 | Medium | 6.8 | 2021-06-10 11:45:12 | Deep Dive |
| CVE-2021-31997 | python-postorius: postorius-permissions.sh used during %post allows local privilege escalation from postorius user to root | openSUSE | Leap 15.2 | Medium | 6.8 | 2021-06-10 11:35:12 | Deep Dive |
| CVE-2021-31998 | inn: %post calls user owned file allowing local privilege escalation to root | SUSE | SUSE Linux Enterprise Server 11-SP3 | Medium | 6.8 | 2021-06-10 11:25:11 | Deep Dive |
| CVE-2021-25317 | cups: ownership of /var/log/cups allows the lp user to create files as root | SUSE | SUSE Linux Enterprise Server 11-SP4-LTSS | Low | 3.3 | 2021-05-05 09:35:13 | Deep Dive |
| CVE-2020-8027 | openldap uses fixed paths in /tmp | SUSE | SUSE Linux Enterprise Server 15-LTSS | High | 7.3 | 2021-02-11 16:10:14 | Deep Dive |
| CVE-2020-8023 | Local privilege escalation from ldap to root when using OPENLDAP_CONFIG_BACKEND=ldap in openldap2 | SUSE | SUSE Enterprise Storage 5 | High | 7.7 | 2020-09-01 11:25:13 | Deep Dive |
| CVE-2020-8025 | outdated entries in permissions profiles for /var/lib/pcp/tmp/* may cause security issues | SUSE | SUSE Linux Enterprise Server 12-SP4 | Medium | 6.1 | 2020-08-07 10:10:14 | Deep Dive |
| CVE-2020-8026 | inn: non-root owned files | openSUSE | openSUSE Leap 15.2 | High | 8.4 | 2020-08-07 09:25:14 | Deep Dive |
| CVE-2020-8014 | kopano-python-services: Local privilege escalation from kopano to root in kopano-spamd subpackage | openSUSE | openSUSE Leap 15.1 | High | 7.7 | 2020-06-29 12:00:23 | Deep Dive |
| CVE-2019-3681 | osc: stores downloaded (supposed) RPM in network-controlled filesystem paths | SUSE | SUSE Linux Enterprise Module for Development Tools 15 | High | 7.5 | 2020-06-29 12:00:17 | Deep Dive |