| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2021-32000 | clone-master-clean-up: dangerous file system operations | SUSE | SUSE Linux Enterprise Server 12 SP3 | Low | 3.2 | 2021-07-28 09:35:12 | Deep Dive |
| CVE-2021-25321 | arpwatch: Local privilege escalation from runtime user to root | SUSE | SUSE Linux Enterprise Server 11-SP4-LTSS | High | 7.8 | 2021-06-30 08:25:13 | Deep Dive |
| CVE-2021-25322 | python-HyperKitty: hyperkitty-permissions.sh used during %post allows local privilege escalation from hyperkitty user to root | openSUSE | Leap 15.2 | Medium | 6.8 | 2021-06-10 11:45:12 | Deep Dive |
| CVE-2021-31997 | python-postorius: postorius-permissions.sh used during %post allows local privilege escalation from postorius user to root | openSUSE | Leap 15.2 | Medium | 6.8 | 2021-06-10 11:35:12 | Deep Dive |
| CVE-2021-31998 | inn: %post calls user owned file allowing local privilege escalation to root | SUSE | SUSE Linux Enterprise Server 11-SP3 | Medium | 6.8 | 2021-06-10 11:25:11 | Deep Dive |
| CVE-2021-25317 | cups: ownership of /var/log/cups allows the lp user to create files as root | SUSE | SUSE Linux Enterprise Server 11-SP4-LTSS | Low | 3.3 | 2021-05-05 09:35:13 | Deep Dive |
| CVE-2021-25319 | virtualbox: missing sticky bit for /etc/vbox allows local root exploit for members of vboxusers group | openSUSE | Factory | High | 7.8 | 2021-05-05 08:25:14 | Deep Dive |
| CVE-2021-25315 | salt-api unauthenticated remote code execution | SUSE | SUSE Linux Enterprise Server 15 SP 3 | Critical | 9.8 | 2021-03-03 09:55:16 | Deep Dive |
| CVE-2020-8032 | Local privilege escalation to root due to insecure tmp file usage | openSUSE | Factory | Medium | 6.7 | 2021-02-25 09:15:17 | Deep Dive |
| CVE-2020-8027 | openldap uses fixed paths in /tmp | SUSE | SUSE Linux Enterprise Server 15-LTSS | High | 7.3 | 2021-02-11 16:10:14 | Deep Dive |
| CVE-2020-8031 | obs: Stored XSS | openSUSE | Open Build Service | Medium | 6.3 | 2021-02-11 15:10:16 | Deep Dive |
| CVE-2018-12475 | obs-service-download_files allows downloading from localhost or intranet hosts | openSUSE | Open Build Service | Medium | 6.5 | 2020-09-01 11:55:12 | Deep Dive |
| CVE-2020-8023 | Local privilege escalation from ldap to root when using OPENLDAP_CONFIG_BACKEND=ldap in openldap2 | SUSE | SUSE Enterprise Storage 5 | High | 7.7 | 2020-09-01 11:25:13 | Deep Dive |
| CVE-2020-8025 | outdated entries in permissions profiles for /var/lib/pcp/tmp/* may cause security issues | SUSE | SUSE Linux Enterprise Server 12-SP4 | Medium | 6.1 | 2020-08-07 10:10:14 | Deep Dive |
| CVE-2020-8026 | inn: non-root owned files | openSUSE | openSUSE Leap 15.2 | High | 8.4 | 2020-08-07 09:25:14 | Deep Dive |
| CVE-2020-8014 | kopano-python-services: Local privilege escalation from kopano to root in kopano-spamd subpackage | openSUSE | openSUSE Leap 15.1 | High | 7.7 | 2020-06-29 12:00:23 | Deep Dive |
| CVE-2019-3681 | osc: stores downloaded (supposed) RPM in network-controlled filesystem paths | SUSE | SUSE Linux Enterprise Module for Development Tools 15 | High | 7.5 | 2020-06-29 12:00:17 | Deep Dive |
| CVE-2020-8019 | syslog-ng: Local privilege escalation from new to root in %post | SUSE | SUSE Linux Enterprise Debuginfo 11-SP3 | High | 7.7 | 2020-06-29 11:30:14 | Deep Dive |
| CVE-2020-8024 | Problematic permissions in hylafax+ packaging allow escalation from uucp to other users | openSUSE | openSUSE Leap 15.2 | Medium | 5.3 | 2020-06-29 07:45:18 | Deep Dive |
| CVE-2020-8021 | unauthorized read access to files where sourceaccess is disabled via a crafted _service file in Open Build Service | openSUSE | Open Build Service | Medium | 5.3 | 2020-05-19 14:25:19 | Deep Dive |