Filter
-Infinity
0

openSUSEobs-service-go_modules: arbitrary directory delete

First published (updated )

openSUSEpaste: XSS on the image upload function

First published (updated )

openSUSEsendmail: mail to root privilege escalation via sm-client.pre script

7.8
First published (updated )

openSUSEslurm: %post for slurm-testsuite operates as root in user owned directory

First published (updated )

Cannacanna: unsafe handling of /tmp/.iroha_unix directory

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSEsuddoers configuration for cscreen not restrictive enough

First published (updated )

openSUSEcscreen: usage of fixed path /tmp/cscreen.debug

First published (updated )

CentOS Grub2-pc-modulesgrub2-once uses fixed file name in /var/tmp

First published (updated )

SUSE Linux Enterprise ServerCommand Injection

7.8
First published (updated )

openSUSEparsec: dangerous 777 permissions for /run/parsec

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

DebianUse After Free

First published (updated )

DebianUse After Free

First published (updated )

Apple iOS and macOSOut-of-bounds Read in vim/vim

7.1
First published (updated )

RubyCGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affe…

7.5
First published (updated )

RubyDate.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service…

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

SUSE Linux Enterprise Serverclone-master-clean-up: dangerous file system operations

7.1
First published (updated )

arpwatcharpwatch: Local privilege escalation from runtime user to root

7.8
First published (updated )

HyperKittypython-HyperKitty: hyperkitty-permissions.sh used during %post allows local privilege escalation from hyperkitty user to root

7.8
First published (updated )

Postoriuspython-postorius: postorius-permissions.sh used during %post allows local privilege escalation from postorius user to root

7.8
First published (updated )

CUPS librariescups: ownership of /var/log/cups allows the lp user to create files as root

3.3
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSEvirtualbox: missing sticky bit for /etc/vbox allows local root exploit for members of vboxusers group

7.8
First published (updated )

redhat/grub2GRUB2 contains a race condition leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing.

First published (updated )

Ubuntu LinuxUse After Free

First published (updated )

openSUSEosc: stores downloaded (supposed) RPM in network-controlled filesystem paths

First published (updated )

Ubuntu LinuxLast updated 24 July 2024

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

FreeRDPLast updated 24 July 2024

3.5
First published (updated )

Ubuntu LinuxLast updated 24 July 2024

First published (updated )

OpenJDK 17Last updated 24 July 2024

First published (updated )

SUSE OBS Service - Tar SCMobs-service-extract_file's outfilename parameter allows to write files outside of package directory

7.5
First published (updated )

PrivoxyLocal privilege escalation from user privoxy to root

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203