Suse Linux Enterprise Server Vulnerabilities
Suse Suse Linux Enterprise Server vulnerabilities.
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Attackers can inject malicious files into osc package sources
CVE-2024-22034SuseSuse Linux Enterprise ...5.5MEDIUMLocal User Escalation via Insecure Packaging
CVE-2024-22029SuseContainer Suse/manager...7.8HIGHsaphanabootstrap-formula: Escalation to root for arbitrary users in hana/ha_cluster.sls
CVE-2022-45153SuseSuse Linux Enterprise ...7HIGHsupportconfig does not remove passwords in /etc/iscsi/iscsid.conf and /etc/target/lio_setup.sh
CVE-2022-45154SuseSuse Linux Enterprise ...4.4MEDIUMrmt-server-pubcloud allows to escalate from user _rmt to root
CVE-2022-31254SuseSuse Linux Enterprise ...7.8HIGHlibzypp-plugin-appdata: potential arbitrary code execution via shell injection due to `os.system` calls
CVE-2023-22643SUSESUSE Linux Enterprise ...7.8HIGHSUMA/UYUNI reflected cross site scripting in /rhn/audit/scap/Search.do
CVE-2022-43754SuseSuse Linux Enterprise ...2.6LOWSUMA/UYUNI arbitrary file disclosure vulnerability in ScapResultDownload
CVE-2022-43753SuseSuse Linux Enterprise ...4.3MEDIUMSUMA/UYUNI directory path traversal vulnerability in CobblerSnipperViewAction
CVE-2022-31255SuseSuse Linux Enterprise ...4.3MEDIUMpermissions: chkstat does not check for group-writable parent directories or target files in safeOpen()
CVE-2022-31252SuseSuse Linux Enterprise ...4.4MEDIUMgrub2-once uses fixed file name in /var/tmp
CVE-2021-46705SuseSuse Linux Enterprise ...5.1MEDIUMclone-master-clean-up: dangerous file system operations
CVE-2021-32000SuseSuse Linux Enterprise ...3.2LOWcryptctl: client side password hashing is equivalent to clear text password storage
CVE-2019-18906SuseSuse Linux Enterprise ...9.8CRITICALarpwatch: Local privilege escalation from runtime user to root
CVE-2021-25321SuseSuse Linux Enterprise ...7.8HIGHinn: %post calls user owned file allowing local privilege escalation to root
CVE-2021-31998SuseSuse Linux Enterprise ...6.8MEDIUMcups: ownership of /var/log/cups allows the lp user to create files as root
CVE-2021-25317SuseSuse Linux Enterprise ...3.3LOWLocal DoS of VM live migration due to use of static tmp files in detach_disks.sh in s390-tools
CVE-2021-25316SuseSuse Linux Enterprise ...3.3LOWsalt-api unauthenticated remote code execution
CVE-2021-25315SuseSuse Linux Enterprise ...9.8CRITICALopenldap uses fixed paths in /tmp
CVE-2020-8027SuseSuse Linux Enterprise ...7.3HIGHsalt-api is accessible to every user on SUSE Manager Server
CVE-2020-8028SuseSuse Linux Enterprise ...9.3CRITICALLocal privilege escalation from ldap to root when using OPENLDAP_CONFIG_BACKEND=ldap in openldap2
CVE-2020-8023SuseSuse Enterprise Storage 57.7HIGHoutdated entries in permissions profiles for /var/lib/pcp/tmp/* may cause security issues
CVE-2020-8025SuseSuse Linux Enterprise ...6.1MEDIUMUser-writeable configuration file /usr/lib/tmpfiles.d/tomcat.conf allows for escalation of priviliges
CVE-2020-8022SuseSuse Enterprise Storage 57.7HIGHsyslog-ng: Local privilege escalation from new to root in %post
CVE-2020-8019SuseSuse Linux Enterprise ...7.7HIGHUser owned /etc in SLES15-SP1-CHOST-BYOS
CVE-2020-8018SuseSuse Linux Enterprise ...8.4HIGH