Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
opensuse backports - vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2019-3692
The packaging of inn on SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local malicious users to escalate from user inn to root via symlink attacks. This issue affects: SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE F...
Suse Inn
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
6.9
CVSSv2
CVE-2019-3698
UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local malicious users to cause cause DoS or potentially escalate privileges by winning a race. This...
Nagios Nagios
Opensuse Backports Sle 15.0
Opensuse Leap 15.1
4.3
CVSSv2
CVE-2019-5844
Out of bounds access in SwiftShader in Google Chrome before 73.0.3683.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
4.3
CVSSv2
CVE-2019-5845
Out of bounds access in SwiftShader in Google Chrome before 73.0.3683.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
4.3
CVSSv2
CVE-2019-5846
Out of bounds access in SwiftShader in Google Chrome before 73.0.3683.75 allowed a remote malicious user to potentially exploit heap corruption via a crafted HTML page.
Google Chrome
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
4.6
CVSSv2
CVE-2020-0561
Improper initialization in the Intel(R) SGX SDK before v2.6.100.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Software Guard Extensions Sdk
Opensuse Backports Sle-15
Opensuse Leap 15.1
7.5
CVSSv2
CVE-2020-12640
Roundcube Webmail prior to 1.4.4 allows malicious users to include local files and execute code via directory traversal in a plugin name to rcube_plugin_api.php.
Roundcube Webmail
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
1 Github repository
7.5
CVSSv2
CVE-2020-12641
rcube_image.php in Roundcube Webmail prior to 1.4.4 allows malicious users to execute arbitrary code via shell metacharacters in a configuration setting for im_convert_path or im_identify_path.
Roundcube Webmail
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
2 Github repositories
1 Article
5
CVSSv2
CVE-2020-25829
An issue has been found in PowerDNS Recursor prior to 4.1.18, 4.2.x prior to 4.2.5, and 4.3.x prior to 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS...
Powerdns Recursor
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
4.9
CVSSv2
CVE-2020-26164
In kdeconnect-kde (aka KDE Connect) prior to 20.08.2, an attacker on the local network could send crafted packets that trigger use of large amounts of CPU, memory, or network connection slots, aka a Denial of Service attack.
Kde Kdeconnect
Opensuse Leap 15.1
Opensuse Backports Sle 15.0
Opensuse Leap 15.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »