Filters

Versions

openSUSE Factorysendmail: mail to root privilege escalation via sm-client.pre script

7.8
First published (updated )

openSUSE Factoryslurm: %post for slurm-testsuite operates as root in user owned directory

First published (updated )

Opensuse Cannacanna: unsafe handling of /tmp/.iroha_unix directory

First published (updated )

Opensuse Cscreensuddoers configuration for cscreen not restrictive enough

First published (updated )

Opensuse Cscreencscreen: usage of fixed path /tmp/cscreen.debug

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Gnu Grub2grub2-once uses fixed file name in /var/tmp

First published (updated )

SUSE Linux Enterprise ServerCommand Injection

7.8
First published (updated )

openSUSE Factoryparsec: dangerous 777 permissions for /run/parsec

First published (updated )

Debian Debian LinuxUse After Free

First published (updated )

Debian Debian LinuxUse After Free

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Apple Mac OS XOut-of-bounds Read in vim/vim

7.1
First published (updated )

rubygems/cgiCGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affe…

7.5
First published (updated )

Ruby-lang DateDate.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service…

7.5
First published (updated )

Suse Arpwatcharpwatch: Local privilege escalation from runtime user to root

7.8
First published (updated )

Python-hyperkitty Project Python-hyperkittypython-HyperKitty: hyperkitty-permissions.sh used during %post allows local privilege escalation from hyperkitty user to root

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Opensuse Python-postoriuspython-postorius: postorius-permissions.sh used during %post allows local privilege escalation from postorius user to root

7.8
First published (updated )

Suse Cupscups: ownership of /var/log/cups allows the lp user to create files as root

3.3
First published (updated )

openSUSE Factoryvirtualbox: missing sticky bit for /etc/vbox allows local root exploit for members of vboxusers group

7.8
First published (updated )

Opensuse Oscosc: stores downloaded (supposed) RPM in network-controlled filesystem paths

First published (updated )

Privoxy PrivoxyLocal privilege escalation from user privoxy to root

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Opensuse MuninLocal privilege escalation from munin to root in the packaging of munin

7.8
First published (updated )

Suse InnLocal privilege escalation from user news to root in the packaging of inn

7.8
First published (updated )

Opensuse MungeLocal privilege escalation from user munge to root

7.8
First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203