Filter
-Infinity
0

SUSE Linux 15.6End of life

First published (updated )

SUSE Linux 15.6End of life

First published (updated )

SUSE LinuxA Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux En…

7.8
First published (updated )

SUSE Linux 15.5Reached end of life

First published (updated )

SUSE Linux 15.5Reached end of life

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

SUSE Linux Enterprise Server for SAPsaphanabootstrap-formula: Escalation to root for arbitrary users in hana/ha_cluster.sls

7.8
First published (updated )

openSUSE libzypp-plugin-appdatalibzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls

7.8
First published (updated )

openSUSE RMT Serverrmt-server-pubcloud allows to escalate from user _rmt to root

7.8
First published (updated )

SUSE Linuxpermissions: chkstat does not check for group-writable parent directories or target files in safeOpen()

First published (updated )

SUSE Linux 15.4Reached end of life

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

SUSE Linux 15.4Reached end of life

First published (updated )

DebianUse After Free

First published (updated )

DebianUse After Free

First published (updated )

RubyCGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affe…

7.5
First published (updated )

RubyDate.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service…

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

arpwatcharpwatch: Local privilege escalation from runtime user to root

7.8
First published (updated )

HyperKittypython-HyperKitty: hyperkitty-permissions.sh used during %post allows local privilege escalation from hyperkitty user to root

7.8
First published (updated )

SUSE inninn: %post calls user owned file allowing local privilege escalation to root

7.8
First published (updated )

Postoriuspython-postorius: postorius-permissions.sh used during %post allows local privilege escalation from postorius user to root

7.8
First published (updated )

IBM InfoSphere Master Data ManagementCSRF

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

CUPS librariescups: ownership of /var/log/cups allows the lp user to create files as root

3.3
First published (updated )

ubuntu/connmanBuffer Overflow

8.8
First published (updated )

ubuntu/connmangdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack inf…

First published (updated )

SaltStackSaltStack Salt rest_cherrypy ssh_port Command Injection Remote Code Execution Vulnerability

First published (updated )

debian/sddmRace Condition

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Google Chrome (Trace Event)Heap buffer overflow in UI on Windows

First published (updated )

Google Chrome (Trace Event)Inappropriate implementation in V8

First published (updated )

redhat/sambaInput Validation, Null Pointer Dereference

First published (updated )

SUSE LinuxAn issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of servi…

7.8
First published (updated )

SUSE LinuxAn issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a den…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203