| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-54467 | NeuVector process with sensitive arguments lead to leakage | SUSE | neuvector | Medium | 5.3 | 2025-09-17 12:29:36 | Deep Dive |
| CVE-2025-53884 | NeuVector has an insecure password storage vulnerable to rainbow attack | SUSE | neuvector | Medium | 5.3 | 2025-09-17 12:27:03 | Deep Dive |
| CVE-2024-58259 | Rancher affected by unauthenticated Denial of Service | SUSE | rancher | High | 8.2 | 2025-09-02 11:53:04 | Deep Dive |
| CVE-2024-52284 | Rancher Fleet Helm Values are stored inside BundleDeployment in plain text | SUSE | Rancher | High | 7.7 | 2025-09-02 11:49:49 | Deep Dive |
| CVE-2025-8671 | CVE-2025-8671 | SUSE Linux | Enterprise Module for Development Tools | - | - | 2025-08-13 12:03:37 | Deep Dive |
| CVE-2025-46809 | Multi Linux Manager epxoses the plain text HTTP Proxy user:password in logs | SUSE | Container suse/manager/4.3/proxy-httpd:4.3.16.9.67.1 | Medium | 5.7 | 2025-07-31 15:24:42 | Deep Dive |
| CVE-2025-46811 | SUSE Multi Linux Manager allows code execution via unprotected websocket endpoint | SUSE | Container suse/manager/5.0/x86_64/server:5.0.5.7.30.1 | Critical | 9.8 | 2025-07-30 14:20:54 | Deep Dive |
| CVE-2025-53882 | The logrotate configuration in the python-mailman of openSUSE allows the mailman user to sent SIGHUP to arbitrary proceess | SUSE | openSUSE Tumbleweed | Medium | 4.4 | 2025-07-23 09:31:19 | Deep Dive |
| CVE-2025-23393 | Reflected XSS in spacewalk-java | SUSE | Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1 | Medium | 5.2 | 2025-05-27 07:23:39 | Deep Dive |
| CVE-2025-23392 | Reflected XSS in SystemsController.java in spacewalk-java | SUSE | Container suse/manager/5.0/x86_64/server:5.0.4.7.19.1 | Medium | 5.2 | 2025-05-26 16:06:26 | Deep Dive |
| CVE-2025-23394 | daily-backup.sh script in cyrus-imapd allows escalation from cyrus to root | SUSE | openSUSE Tumbleweed | - | - | 2025-05-26 15:34:33 | Deep Dive |
| CVE-2025-46802 | Temporary chown() of users' TTY to mode 0666 allows PTY hijacking in screen | SUSE | SUSE Linux Enterprise Micro 5.3 | Medium | 6.0 | 2025-05-26 15:10:38 | Deep Dive |
| CVE-2023-32197 | Rancher's External RoleTemplates can lead to privilege escalation | SUSE | rancher | Medium | 6.6 | 2025-04-16 08:40:54 | Deep Dive |
| CVE-2024-22036 | Rancher Remote Code Execution via Cluster/Node Drivers | SUSE | rancher | Critical | 9.1 | 2025-04-16 08:37:54 | Deep Dive |
| CVE-2024-52281 | Stored Cross-site Scripting vulnerability in Rancher UI | SUSE | rancher | High | 8.9 | 2025-04-16 08:31:11 | Deep Dive |
| CVE-2024-52280 | Users can issue watch commands for arbitrary resources | SUSE | rancher | High | 7.7 | 2025-04-11 11:12:44 | Deep Dive |
| CVE-2024-52282 | Rancher Helm Applications may have sensitive values leaked | SUSE | rancher | Medium | 6.2 | 2025-04-11 10:57:55 | Deep Dive |
| CVE-2025-23387 | Rancher's SAML-based login via CLI can be denied by unauthenticated users | SUSE | rancher | Medium | 5.3 | 2025-04-11 10:52:45 | Deep Dive |
| CVE-2025-23388 | Unauthenticated stack overflow in /v3-public/authproviders API | SUSE | rancher | High | 8.2 | 2025-04-11 10:48:51 | Deep Dive |
| CVE-2025-23389 | Rancher does not Properly Validate Account Bindings in SAML Authentication Enables User Impersonation on First Login | SUSE | rancher | High | 8.4 | 2025-04-11 10:46:44 | Deep Dive |