Filter
AND
AND
-Infinity
0

UbuntuUse After Free

First published (updated )

UbuntuOut of bounds read in Skia

First published (updated )

OneIdentity Syslog-ngsyslog-ng: Local privilege escalation from new to root in %post

7.8
First published (updated )

openSUSEosc: stores downloaded (supposed) RPM in network-controlled filesystem paths

First published (updated )

redhat/grub2GRUB2 contained integer overflows when handling the initrd command, leading to a heap-based buffer overflow.

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

SUSE Linux Enterprise Serverwicked: Use-after-free when receiving invalid DHCP6 client options

First published (updated )

TeX Liverace condition on texlive-filesystem cron job allows for the deletion of unintended files

First published (updated )

SUSE Linux Enterprise ServerLocal privilege escalation from user salt to root

8.4
First published (updated )

SUSE Linux Enterprise Servermysql-systemd-helper allows setting 640 permissions of arbitrary files

First published (updated )

SUSE Linux Enterprise Serverwicked: Use-after-free when receiving invalid DHCP6 IA_PD option

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSELocal privilege escalation from munin to root in the packaging of munin

7.8
First published (updated )

redhat/grub2GRUB2: avoid loading unsigned kernels when GRUB is booted directly under secureboot without shim

First published (updated )

redhat/grub2GRUB2 contains a race condition leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing.

First published (updated )

SUSE PCPpcp: Local privilege escalation from user pcp to root through migrate_tempdirs

8.4
First published (updated )

PHPUninitialized read in gdImageCreateFromXbm

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

SUSE innLocal privilege escalation from user news to root in the packaging of inn

7.8
First published (updated )

Trouserstrousers: Local privilege escalation from tss to root

7.8
First published (updated )

SUSE Linux Enterprise Serverpermissions: chkstat sets unintended setuid/capabilities for mrsh and wodim

2.5
First published (updated )

SUSE LinuxThe jpc_floorlog2 function in jpc_math.c in JasPer before 1.900.17 allows remote attackers to cause …

7.5
First published (updated )

SUSE LinuxInput Validation

8.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

SUSE LinuxInput Validation, Path Traversal

8.1
First published (updated )

Debian LinuxSQL Injection, Null Pointer Dereference

7.5
First published (updated )

Debian LinuxNull Pointer Dereference, SQL Injection

7.5
First published (updated )

Debian LinuxSQL Injection, Null Pointer Dereference

7.5
First published (updated )

Debian LinuxSQL Injection, Malicious File Upload

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

openSUSE RMT ServerMigrations requests can cause DoS on rmt

7.5
First published (updated )

ThunderbirdA vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs…

First published (updated )

ThunderbirdMozilla developers and community members Andreea Pavel, Christian Holler, Honza Bambas, Jason Kratze…

First published (updated )

MailmanLocal privilege escalation from user wwwrun to root in the packaging of mailman

7.8
First published (updated )

Nagios Pluginsnagios cron job allows privilege escalation from user nagios to root

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203