| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2021-25316 | Local DoS of VM live migration due to use of static tmp files in detach_disks.sh in s390-tools | SUSE | SUSE Linux Enterprise Server 12-SP5 | Low | 3.3 | 2021-04-14 09:55:13 | Deep Dive |
| CVE-2021-25315 | salt-api unauthenticated remote code execution | SUSE | SUSE Linux Enterprise Server 15 SP 3 | Critical | 9.8 | 2021-03-03 09:55:16 | Deep Dive |
| CVE-2020-8027 | openldap uses fixed paths in /tmp | SUSE | SUSE Linux Enterprise Server 15-LTSS | High | 7.3 | 2021-02-11 16:10:14 | Deep Dive |
| CVE-2020-8028 | salt-api is accessible to every user on SUSE Manager Server | SUSE | SUSE Linux Enterprise Module for SUSE Manager Server 4.1 | Critical | 9.3 | 2020-09-17 08:45:17 | Deep Dive |
| CVE-2020-8023 | Local privilege escalation from ldap to root when using OPENLDAP_CONFIG_BACKEND=ldap in openldap2 | SUSE | SUSE Enterprise Storage 5 | High | 7.7 | 2020-09-01 11:25:13 | Deep Dive |
| CVE-2020-8025 | outdated entries in permissions profiles for /var/lib/pcp/tmp/* may cause security issues | SUSE | SUSE Linux Enterprise Server 12-SP4 | Medium | 6.1 | 2020-08-07 10:10:14 | Deep Dive |
| CVE-2020-8019 | syslog-ng: Local privilege escalation from new to root in %post | SUSE | SUSE Linux Enterprise Debuginfo 11-SP3 | High | 7.7 | 2020-06-29 11:30:14 | Deep Dive |
| CVE-2020-8022 | User-writeable configuration file /usr/lib/tmpfiles.d/tomcat.conf allows for escalation of priviliges | SUSE | SUSE Enterprise Storage 5 | High | 7.7 | 2020-06-29 08:20:13 | Deep Dive |
| CVE-2020-8018 | User owned /etc in SLES15-SP1-CHOST-BYOS | SUSE | SUSE Linux Enterprise Server 15 SP1 | High | 8.4 | 2020-05-04 11:35:12 | Deep Dive |
| CVE-2019-18905 | Deprecated functionality in autoyast2 automatically imports gpg keys without checking them | SUSE | SUSE Linux Enterprise Server 12 | Medium | 4.8 | 2020-04-03 11:00:17 | Deep Dive |
| CVE-2019-18904 | Migrations requests can cause DoS on rmt | SUSE | SUSE Linux Enterprise High Performance Computing 15-ESPOS | Medium | 6.5 | 2020-04-03 07:10:13 | Deep Dive |
| CVE-2019-3696 | pcp: Local privilege escalation from user pcp to root through migrate_tempdirs | SUSE | SUSE Linux Enterprise High Performance Computing 15-ESPOS | High | 8.4 | 2020-03-03 11:05:19 | Deep Dive |
| CVE-2019-3695 | pcp: Local privilege escalation from user pcp to root | SUSE | SUSE Linux Enterprise High Performance Computing 15-ESPOS | High | 8.4 | 2020-03-03 11:05:18 | Deep Dive |
| CVE-2019-18903 | wicked: Use-after-free when receiving invalid DHCP6 IA_PD option | SUSE | SUSE Linux Enterprise Server 12 | High | 7.5 | 2020-03-02 16:45:19 | Deep Dive |
| CVE-2019-18902 | wicked: Use-after-free when receiving invalid DHCP6 client options | SUSE | SUSE Linux Enterprise Server 12 | High | 7.5 | 2020-03-02 16:45:18 | Deep Dive |
| CVE-2020-8013 | permissions: chkstat sets unintended setuid/capabilities for mrsh and wodim | SUSE | SUSE Linux Enterprise Server 12 | Low | 2.2 | 2020-03-02 16:35:13 | Deep Dive |
| CVE-2019-18901 | mysql-systemd-helper allows setting 640 permissions of arbitrary files | SUSE | SUSE Linux Enterprise Server 12 | Medium | 5.1 | 2020-03-02 16:10:14 | Deep Dive |
| CVE-2019-18897 | Local privilege escalation from user salt to root | SUSE | SUSE Linux Enterprise Server 12 | High | 8.4 | 2020-03-02 15:20:27 | Deep Dive |
| CVE-2019-3698 | nagios cron job allows privilege escalation from user nagios to root | SUSE | SUSE Linux Enterprise Server 12 | Medium | 5.7 | 2020-02-28 13:20:14 | Deep Dive |
| CVE-2018-20105 | yast2-rmt exposes CA private key passhrase in log-file | SUSE | SUSE Linux Enterprise Server 15 | Medium | 4.0 | 2020-01-27 08:50:13 | Deep Dive |