| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-8671 | CVE-2025-8671 | SUSE Linux | Enterprise Module for Development Tools | - | - | 2025-08-13 12:03:37 | Deep Dive |
| CVE-2025-46802 | Temporary chown() of users' TTY to mode 0666 allows PTY hijacking in screen | SUSE | SUSE Linux Enterprise Micro 5.3 | Medium | 6.0 | 2025-05-26 15:10:38 | Deep Dive |
| CVE-2024-22034 | Crafted projects can overwrite special files in the .osc config directory | SUSE | SUSE Linux Enterprise Desktop 15 SP5 | Medium | 5.5 | 2024-10-16 13:46:08 | Deep Dive |
| CVE-2024-22029 | tomcat packaging allows for escalation to root from tomcat user | SUSE | Container suse/manager/5.0/x86_64/server:5.0.0-beta1.2.122 | High | 7.8 | 2024-10-16 13:20:48 | Deep Dive |
| CVE-2023-32182 | SUSE Linux Enterprise Desktop 后置链接漏洞 | SUSE | SUSE Linux Enterprise Desktop 15 SP5 | Medium | 5.9 | 2023-09-19 15:07:03 | Deep Dive |
| CVE-2019-18904 | Migrations requests can cause DoS on rmt | SUSE | SUSE Linux Enterprise High Performance Computing 15-ESPOS | Medium | 6.5 | 2020-04-03 07:10:13 | Deep Dive |
| CVE-2019-3696 | pcp: Local privilege escalation from user pcp to root through migrate_tempdirs | SUSE | SUSE Linux Enterprise High Performance Computing 15-ESPOS | High | 8.4 | 2020-03-03 11:05:19 | Deep Dive |
| CVE-2019-3695 | pcp: Local privilege escalation from user pcp to root | SUSE | SUSE Linux Enterprise High Performance Computing 15-ESPOS | High | 8.4 | 2020-03-03 11:05:18 | Deep Dive |