| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2020-8013 | permissions: chkstat sets unintended setuid/capabilities for mrsh and wodim | SUSE | SUSE Linux Enterprise Server 12 | Low | 2.2 | 2020-03-02 16:35:13 | Deep Dive |
| CVE-2019-18901 | mysql-systemd-helper allows setting 640 permissions of arbitrary files | SUSE | SUSE Linux Enterprise Server 12 | Medium | 5.1 | 2020-03-02 16:10:14 | Deep Dive |
| CVE-2019-18897 | Local privilege escalation from user salt to root | SUSE | SUSE Linux Enterprise Server 12 | High | 8.4 | 2020-03-02 15:20:27 | Deep Dive |
| CVE-2019-3698 | nagios cron job allows privilege escalation from user nagios to root | SUSE | SUSE Linux Enterprise Server 12 | Medium | 5.7 | 2020-02-28 13:20:14 | Deep Dive |
| CVE-2018-20105 | yast2-rmt exposes CA private key passhrase in log-file | SUSE | SUSE Linux Enterprise Server 15 | Medium | 4.0 | 2020-01-27 08:50:13 | Deep Dive |
| CVE-2018-12476 | obs-service-extract_file's outfilename parameter allows to write files outside of package directory | SUSE | SUSE Linux Enterprise Server 15 | Medium | 4.3 | 2020-01-27 08:30:15 | Deep Dive |
| CVE-2019-18900 | libzypp stores cookies world readable | SUSE | CaaS Platform 3.0 | Medium | 4.0 | 2020-01-24 15:15:16 | Deep Dive |
| CVE-2019-3693 | Local privilege escalation from user wwwrun to root in the packaging of mailman | SUSE | SUSE Linux Enterprise Server 11 | High | 7.7 | 2020-01-24 10:05:17 | Deep Dive |
| CVE-2019-3692 | Local privilege escalation from user news to root in the packaging of inn | SUSE | SUSE Linux Enterprise Server 11 | High | 7.7 | 2020-01-24 08:50:12 | Deep Dive |
| CVE-2019-3687 | "easy" permission profile allows everyone execute dumpcap and read all network traffic | SUSE | SUSE Linux Enterprise Server | Medium | 4.0 | 2020-01-24 08:25:14 | Deep Dive |
| CVE-2019-3691 | Local privilege escalation from user munge to root | SUSE | SUSE Linux Enterprise Server 15 | High | 7.7 | 2020-01-23 16:00:20 | Deep Dive |
| CVE-2019-18898 | trousers: Local privilege escalation from tss to root | SUSE | SUSE Linux Enterprise Server 15 SP1 | High | 7.7 | 2020-01-23 14:05:14 | Deep Dive |
| CVE-2019-3688 | squid: /usr/sbin/pinger packaged with wrong permission | SUSE | SUSE Linux Enterprise Server 15 | Medium | 5.1 | 2019-10-07 14:00:39 | Deep Dive |
| CVE-2019-3689 | nfs-utils: root-owned files stored in insecure /var/lib/nfs directory | SUSE | SUSE Linux Enterprise Server 12 | Medium | 5.1 | 2019-09-19 13:27:58 | Deep Dive |
| CVE-2011-4182 | shell code injection via ESSID because of missing escaping of a variable | SUSE Linux Enterprise | sysconfig | 高危 | - | 2018-06-12 15:00:00 | Deep Dive |
| CVE-2011-3172 | unix2_chkpwd do not check for a valid account | SUSE | SUSE Linux Enterprise | 超危 | - | 2018-06-08 13:00:00 | Deep Dive |