| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2023-32190 | mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable | SUSE | openSUSE Tumbleweed | 高危 | - | 2024-10-16 12:03:05 | Deep Dive |
| CVE-2023-32188 | JWT token compromise can allow malicious actions including Remote Code Execution (RCE) | SUSE | neuvector | - | - | 2024-10-16 08:26:00 | Deep Dive |
| CVE-2023-22650 | Rancher does not automatically clean up a user deleted or disabled from the configured Authentication Provider | SUSE | rancher | High | 8.8 | 2024-10-16 08:20:42 | Deep Dive |
| CVE-2023-22649 | Rancher 'Audit Log' leaks sensitive information | SUSE | rancher | High | 8.4 | 2024-10-16 07:46:51 | Deep Dive |
| CVE-2023-22644 | JWT token compromise can allow malicious actions including Remote Code Execution (RCE) | SUSE | neuvector | 中危 | - | 2023-09-20 08:12:34 | Deep Dive |
| CVE-2023-32182 | SUSE Linux Enterprise Desktop 后置链接漏洞 | SUSE | SUSE Linux Enterprise Desktop 15 SP5 | Medium | 5.9 | 2023-09-19 15:07:03 | Deep Dive |
| CVE-2023-32186 | RKE2 安全漏洞 | SUSE | RKE2 | High | 7.5 | 2023-09-19 09:32:49 | Deep Dive |
| CVE-2023-32187 | SUSE Rancher K3s 安全漏洞 | SUSE | k3s | High | 7.5 | 2023-09-18 12:04:28 | Deep Dive |
| CVE-2022-43760 | Rancher Labs Rancher 跨站脚本漏洞 | SUSE | Rancher | High | 8.4 | 2023-06-01 12:56:40 | Deep Dive |
| CVE-2023-22647 | Rancher Labs Rancher 安全漏洞 | SUSE | Rancher | Critical | 9.9 | 2023-06-01 12:52:49 | Deep Dive |
| CVE-2023-22648 | Rancher Labs Rancher 安全漏洞 | SUSE | Rancher | High | 8.0 | 2023-06-01 12:49:35 | Deep Dive |
| CVE-2023-22651 | Rancher 安全漏洞 | SUSE | Rancher | Critical | 9.9 | 2023-05-04 07:53:50 | Deep Dive |
| CVE-2023-22645 | kubewarden: Excessive permissions for kubewarden-controller-manager-cluster-role | SUSE | kubewarden | High | 8.0 | 2023-04-19 00:00:00 | Deep Dive |
| CVE-2022-45155 | obs-service-go_modules: arbitrary directory delete | SUSE | openSUSE Factory | Medium | 5.5 | 2023-03-15 00:00:00 | Deep Dive |
| CVE-2022-45154 | supportconfig does not remove passwords in /etc/iscsi/iscsid.conf and /etc/target/lio_setup.sh | SUSE | SUSE Linux Enterprise Server 12 | Medium | 4.4 | 2023-02-15 00:00:00 | Deep Dive |
| CVE-2022-45153 | saphanabootstrap-formula: Escalation to root for arbitrary users in hana/ha_cluster.sls | SUSE | SUSE Linux Enterprise Module for SAP Applications 15-SP1 | High | 7.0 | 2023-02-15 00:00:00 | Deep Dive |
| CVE-2022-31249 | [RANCHER] OS command injection in Rancher and Fleet | SUSE | Rancher | High | 7.5 | 2023-02-07 00:00:00 | Deep Dive |
| CVE-2022-43755 | Rancher: Non-random authentication token | SUSE | Rancher | High | 7.1 | 2023-02-07 00:00:00 | Deep Dive |
| CVE-2022-31254 | rmt-server-pubcloud allows to escalate from user _rmt to root | SUSE | SUSE Linux Enterprise Server for SAP 15 | High | 7.8 | 2023-02-07 00:00:00 | Deep Dive |
| CVE-2023-22643 | libzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls | SUSE | SUSE Linux Enterprise Server for SAP 15-SP3 | Medium | 6.3 | 2023-02-07 00:00:00 | Deep Dive |