Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2024-49506

Disclosure Date: November 13, 2024 (last updated November 14, 2024)
Insecure creation of temporary files allows local users on systems with non-default configurations to cause denial of service or set the encryption key for a filesystem
0
Attacker Value
Unknown

CVE-2024-49504

Disclosure Date: November 13, 2024 (last updated November 14, 2024)
grub2 allowed attackers with access to the grub shell to access files on the encrypted disks.
0
Attacker Value
Unknown

CVE-2024-22034

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
Attackers could put the special files in .osc into the actual package sources (e.g. _apiurl). This allows the attacker to change the configuration of osc for the victim
0
Attacker Value
Unknown

CVE-2024-22033

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
The OBS service obs-service-download_url was vulnerable to a command injection vulnerability. The attacker could provide a configuration to the service that allowed to execute command in later steps
0
Attacker Value
Unknown

CVE-2024-22029

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
Insecure permissions in the packaging of tomcat allow local users that win a race during package installation to escalate to root
0
Attacker Value
Unknown

CVE-2023-32190

Disclosure Date: October 16, 2024 (last updated October 17, 2024)
mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges.
0
Attacker Value
Unknown

CVE-2023-32183

Disclosure Date: July 07, 2023 (last updated October 08, 2023)
Incorrect Default Permissions vulnerability in the openSUSE Tumbleweed hawk2 package allows users with access to the hacluster to escalate to root This issue affects openSUSE Tumbleweed.
Attacker Value
Unknown

CVE-2022-31250

Disclosure Date: June 24, 2022 (last updated November 29, 2024)
A UNIX Symbolic Link (Symlink) Following vulnerability in keylime of openSUSE Tumbleweed allows local attackers to escalate from the keylime user to root. This issue affects: openSUSE Tumbleweed keylime versions prior to 6.4.2-1.1.
Attacker Value
Unknown

CVE-2020-8026

Disclosure Date: August 07, 2020 (last updated February 21, 2025)
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior versions. openSUSE Tumbleweed inn version 2.6.2-4.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.3.3.1 and prior versions.
Attacker Value
Unknown

CVE-2020-8014

Disclosure Date: May 19, 2020 (last updated February 21, 2025)
A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of kopano-spamd of openSUSE Leap 15.1, openSUSE Tumbleweed allowed local attackers with the privileges of the kopano user to escalate to root. This issue affects: openSUSE Leap 15.1 kopano-spamd versions prior to 10.0.5-lp151.4.1. openSUSE Tumbleweed kopano-spamd versions prior to 10.0.5-1.1.