Filter

Opensuse MirrorcacheXSS vulnerability found in OpenSuse MirrorCache

First published (updated )

openSUSE 15.6End of life

First published (updated )

openSUSE 15.6End of life

First published (updated )

BleepingComputerRed Hat warns of backdoor in XZ tools used by most Linux distros

First published (updated )

openSUSEA Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux En…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSE libeconfA stack overflow vulnerability exists in function econf_writeFile in file atlibeconf/lib/libeconf.c …

8.8
First published (updated )

openSUSE libeconfA stack overflow vulnerability exists in function read_file in atlibeconf/lib/getfilecontents.c in l…

8.8
First published (updated )

Opensuse WelcomeopenSUSE-welcome: local privilege escalation when choosing XFCE desktop layout (CVE-2023-32184)

7.8
First published (updated )

openSUSE TumbleweedIncorrect Default Permissions vulnerability in the openSUSE Tumbleweed hawk2 package allows users wi…

7.8
First published (updated )

openSUSE 15.5Reached end of life

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSE 15.5Reached end of life

First published (updated )

openSUSE libeconfStack buffer overflow in "read_file" function

First published (updated )

openSUSE libeconfStack buffer overflow in "econf_writeFile" function

First published (updated )

Opensuse Supportutilssupportconfig does not remove passwords in /etc/iscsi/iscsid.conf and /etc/target/lio_setup.sh

First published (updated )

SUSE Linux Enterprise Server for SAPsaphanabootstrap-formula: Escalation to root for arbitrary users in hana/ha_cluster.sls

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSE libzypp-plugin-appdatalibzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls

7.8
First published (updated )

openSUSE rmt-serverrmt-server-pubcloud allows to escalate from user _rmt to root

7.8
First published (updated )

openSUSE pastepaste: XSS on the image upload function

First published (updated )

Opensuse Travel Support Programtravel-support-program vulnerable to data exfiltration via Ransack query injection

7.5
First published (updated )

openSUSE openldap2openldap2: /usr/lib/openldap/start allows ldap user/group to recursively chown arbitrary directory trees to itself

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSEsendmail: mail to root privilege escalation via sm-client.pre script

7.8
First published (updated )

openSUSEpermissions: chkstat does not check for group-writable parent directories or target files in safeOpen()

First published (updated )

Linux-PAMThe Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH …

First published (updated )

openSUSEslurm: %post for slurm-testsuite operates as root in user owned directory

First published (updated )

Cannacanna: unsafe handling of /tmp/.iroha_unix directory

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSE Tumbleweedkeylime %post scriplet allows for privilege escalation from keylime user to root

7.8
First published (updated )

openSUSE 15.4Reached end of life

First published (updated )

openSUSE 15.4Reached end of life

First published (updated )

openSUSE Open Build ServiceMultiple XXE vulnerabilities in OBS

First published (updated )

openSUSEsuddoers configuration for cscreen not restrictive enough

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203