Filter

openSUSE 15.6End of life

First published (updated )

openSUSE 15.6End of life

First published (updated )

openSUSEA Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux En…

7.8
First published (updated )

openSUSE 15.5Reached end of life

First published (updated )

openSUSE 15.5Reached end of life

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

SUSE Linux Enterprise Server for SAPsaphanabootstrap-formula: Escalation to root for arbitrary users in hana/ha_cluster.sls

7.8
First published (updated )

openSUSE libzypp-plugin-appdatalibzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls

7.8
First published (updated )

openSUSE rmt-serverrmt-server-pubcloud allows to escalate from user _rmt to root

7.8
First published (updated )

openSUSEpermissions: chkstat does not check for group-writable parent directories or target files in safeOpen()

First published (updated )

openSUSE 15.4Reached end of life

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSE 15.4Reached end of life

First published (updated )

Debian Debian LinuxUse After Free

First published (updated )

Debian Debian LinuxUse After Free

First published (updated )

redhat/ruby-dateDate.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service…

7.5
First published (updated )

SUSE arpwatcharpwatch: Local privilege escalation from runtime user to root

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

python-HyperKitty project python-HyperKittypython-HyperKitty: hyperkitty-permissions.sh used during %post allows local privilege escalation from hyperkitty user to root

7.8
First published (updated )

openSUSE python-postoriuspython-postorius: postorius-permissions.sh used during %post allows local privilege escalation from postorius user to root

7.8
First published (updated )

IBM InfoSphere Master Data ManagementCSRF

First published (updated )

SUSE CUPScups: ownership of /var/log/cups allows the lp user to create files as root

3.3
First published (updated )

ubuntu/connmanBuffer Overflow

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

ubuntu/connmangdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack inf…

First published (updated )

Google ChromeHeap buffer overflow in UI on Windows

First published (updated )

Google ChromeInappropriate implementation in V8

First published (updated )

openSUSEAn issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of servi…

7.8
First published (updated )

openSUSEAn issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a den…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSEUse After Free, Race Condition

First published (updated )

Linux Linux kernelLast updated 29 November 2024

First published (updated )

debian/imagemagickDivide by Zero

First published (updated )

Oracle JDK 6An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenti…

3.1
First published (updated )

Mozilla Firefox ESRUse After Free

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203