| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2022-31252 | permissions: chkstat does not check for group-writable parent directories or target files in safeOpen() | SUSE | SUSE Linux Enterprise Server 12-SP5 | Medium | 4.4 | 2022-10-06 17:14:05 | Deep Dive |
| CVE-2020-27792 | Ghostscript: heap buffer over write vulnerability in ghostscript's lp8000_print_page() in gdevlp8k.c | Red Hat | Red Hat Enterprise Linux 8 | High | 7.1 | 2022-08-19 22:46:08 | Deep Dive |
| CVE-2022-1665 | IBM Power System 安全漏洞 | - | Red Hat Enterprise Linux | 高危 | - | 2022-06-21 14:23:40 | Deep Dive |
| CVE-2021-46705 | grub2-once uses fixed file name in /var/tmp | SUSE | SUSE Linux Enterprise Server 15 SP4 | Medium | 5.1 | 2022-03-16 09:50:10 | Deep Dive |
| CVE-2021-32000 | clone-master-clean-up: dangerous file system operations | SUSE | SUSE Linux Enterprise Server 12 SP3 | Low | 3.2 | 2021-07-28 09:35:12 | Deep Dive |
| CVE-2021-31999 | Rancher: Privilege escalation vulnerability via malicious Connection header | Rancher | Rancher | High | 8.8 | 2021-07-15 08:55:19 | Deep Dive |
| CVE-2019-18906 | cryptctl: client side password hashing is equivalent to clear text password storage | SUSE | SUSE Linux Enterprise Server for SAP 12-SP5 | Critical | 9.8 | 2021-06-30 08:35:12 | Deep Dive |
| CVE-2021-25321 | arpwatch: Local privilege escalation from runtime user to root | SUSE | SUSE Linux Enterprise Server 11-SP4-LTSS | High | 7.8 | 2021-06-30 08:25:13 | Deep Dive |
| CVE-2021-31998 | inn: %post calls user owned file allowing local privilege escalation to root | SUSE | SUSE Linux Enterprise Server 11-SP3 | Medium | 6.8 | 2021-06-10 11:25:11 | Deep Dive |
| CVE-2021-25317 | cups: ownership of /var/log/cups allows the lp user to create files as root | SUSE | SUSE Linux Enterprise Server 11-SP4-LTSS | Low | 3.3 | 2021-05-05 09:35:13 | Deep Dive |
| CVE-2021-28828 | TIBCO Administrator SQL injection vulnerability | TIBCO Software Inc. | TIBCO Administrator - Enterprise Edition | High | 7.6 | 2021-04-20 18:30:18 | Deep Dive |
| CVE-2021-28829 | TIBCO Administrator CSV injection vulnerability | TIBCO Software Inc. | TIBCO Administrator - Enterprise Edition | Medium | 6.5 | 2021-04-20 18:30:18 | Deep Dive |
| CVE-2021-28827 | TIBCO Administrator Stored Cross Site Scripting vulnerability | TIBCO Software Inc. | TIBCO Administrator - Enterprise Edition | Critical | 9.6 | 2021-04-20 18:30:17 | Deep Dive |
| CVE-2021-25314 | hawk: Insecure file permissions | SUSE | SUSE Linux Enterprise High Availability 12-SP3 | High | 7.8 | 2021-04-14 15:00:18 | Deep Dive |
| CVE-2021-25316 | Local DoS of VM live migration due to use of static tmp files in detach_disks.sh in s390-tools | SUSE | SUSE Linux Enterprise Server 12-SP5 | Low | 3.3 | 2021-04-14 09:55:13 | Deep Dive |
| CVE-2021-25315 | salt-api unauthenticated remote code execution | SUSE | SUSE Linux Enterprise Server 15 SP 3 | Critical | 9.8 | 2021-03-03 09:55:16 | Deep Dive |
| CVE-2020-8027 | openldap uses fixed paths in /tmp | SUSE | SUSE Linux Enterprise Server 15-LTSS | High | 7.3 | 2021-02-11 16:10:14 | Deep Dive |
| CVE-2020-8028 | salt-api is accessible to every user on SUSE Manager Server | SUSE | SUSE Linux Enterprise Module for SUSE Manager Server 4.1 | Critical | 9.3 | 2020-09-17 08:45:17 | Deep Dive |
| CVE-2020-8023 | Local privilege escalation from ldap to root when using OPENLDAP_CONFIG_BACKEND=ldap in openldap2 | SUSE | SUSE Enterprise Storage 5 | High | 7.7 | 2020-09-01 11:25:13 | Deep Dive |
| CVE-2020-8025 | outdated entries in permissions profiles for /var/lib/pcp/tmp/* may cause security issues | SUSE | SUSE Linux Enterprise Server 12-SP4 | Medium | 6.1 | 2020-08-07 10:10:14 | Deep Dive |