| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-25701 | openSUSE sdbootutil 安全漏洞 | openSUSE | sdbootutil | - | - | 2026-02-25 10:59:58 | Deep Dive |
| CVE-2025-62875 | Local DoS in OpenSMTPD via UNIX domain socket smtpd.sock | SUSE | openSUSE Tumbleweed | 中危 | - | 2025-11-20 16:02:12 | Deep Dive |
| CVE-2025-62876 | LightDM KDE Greeter 安全漏洞 | SUSE | openSUSE | 中危 | - | 2025-11-12 12:57:54 | Deep Dive |
| CVE-2025-53881 | SUSE-specific logrotate configuration allows escalation from mail user/group to root | openSUSE | Tumbleweed | - | - | 2025-10-02 13:51:57 | Deep Dive |
| CVE-2025-46810 | openSUSE Tumbleweed 安全漏洞 | openSUSE | Tumbleweed | 高危 | - | 2025-09-02 11:34:32 | Deep Dive |
| CVE-2025-8671 | CVE-2025-8671 | SUSE Linux | Enterprise Module for Development Tools | - | - | 2025-08-13 12:03:37 | Deep Dive |
| CVE-2025-53882 | The logrotate configuration in the python-mailman of openSUSE allows the mailman user to sent SIGHUP to arbitrary proceess | SUSE | openSUSE Tumbleweed | Medium | 4.4 | 2025-07-23 09:31:19 | Deep Dive |
| CVE-2025-23394 | daily-backup.sh script in cyrus-imapd allows escalation from cyrus to root | SUSE | openSUSE Tumbleweed | - | - | 2025-05-26 15:34:33 | Deep Dive |
| CVE-2025-23386 | gerbera: Privilege escalation from user gerbera to root because of insecure %post script | SUSE | openSUSE Tumbleweed | High | 7.8 | 2025-04-10 09:42:18 | Deep Dive |
| CVE-2024-22038 | DoS attacks, information leaks etc. with crafted Git repositories in obs-scm-bridge | SUSE | openSUSE Factory | High | 7.3 | 2024-11-28 09:38:03 | Deep Dive |
| CVE-2024-49504 | grub2 allows bypassing TPM-bound disk encryption on SL(E)M encrypted Images | SUSE | openSUSE Tumbleweed | - | - | 2024-11-13 14:44:24 | Deep Dive |
| CVE-2024-49505 | XSS vulnerability found in OpenSuse MirrorCache | openSUSE | Tumbleweed | - | - | 2024-11-13 14:21:00 | Deep Dive |
| CVE-2024-49506 | Fixed temporary file path in aeon-checks allows fixing of disk encryption key | openSUSE | Tumbleweed | - | - | 2024-11-13 14:15:09 | Deep Dive |
| CVE-2024-22034 | Crafted projects can overwrite special files in the .osc config directory | SUSE | SUSE Linux Enterprise Desktop 15 SP5 | Medium | 5.5 | 2024-10-16 13:46:08 | Deep Dive |
| CVE-2024-22033 | obs-service-download_url is vulnerable to argument injection | SUSE | SUSE Package Hub 15 SP5 | Medium | 6.3 | 2024-10-16 13:42:47 | Deep Dive |
| CVE-2024-22029 | tomcat packaging allows for escalation to root from tomcat user | SUSE | Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122 | High | 7.8 | 2024-10-16 13:20:48 | Deep Dive |
| CVE-2023-32190 | mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable | SUSE | openSUSE Tumbleweed | 高危 | - | 2024-10-16 12:03:05 | Deep Dive |
| CVE-2023-32182 | SUSE Linux Enterprise Desktop 后置链接漏洞 | SUSE | SUSE Linux Enterprise Desktop 15 SP5 | Medium | 5.9 | 2023-09-19 15:07:03 | Deep Dive |
| CVE-2023-32184 | openSUSE opensuse-welcome 安全漏洞 | openSUSE | opensuse-welcome | High | 7.8 | 2023-09-19 09:42:48 | Deep Dive |
| CVE-2023-32183 | openSUSE Tumbleweed 安全漏洞 | openSUSE | Tumbleweed | High | 7.8 | 2023-07-07 08:11:07 | Deep Dive |