Suse

Suse Linux Enterprise Server

131 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 37.42%
  • Veröffentlicht 07.11.2018 05:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:14

An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a...

  • EPSS 0.04%
  • Veröffentlicht 10.08.2018 15:29:01
  • Zuletzt bearbeitet 21.11.2024 04:10:53

lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also ...

  • EPSS 0.23%
  • Veröffentlicht 08.06.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 01:31:59

The kdump implementation is missing the host key verification in the kdump and mkdumprd OpenSSH integration of kdump prior to version 2012-01-20. This is similar to CVE-2011-3588, but different in that the kdump implementation is specific to SUSE. A ...

  • EPSS 0.23%
  • Veröffentlicht 08.06.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 01:29:53

A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12.

  • EPSS 1.19%
  • Veröffentlicht 01.03.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:13:31

A race condition in the postgresql init script could be used by attackers able to access the postgresql account to escalate their privileges to root.

Exploit
  • EPSS 94.33%
  • Veröffentlicht 04.01.2018 13:29:00
  • Zuletzt bearbeitet 14.01.2025 19:29:55

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

  • EPSS 6.21%
  • Veröffentlicht 09.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remot...

  • EPSS 34.23%
  • Veröffentlicht 21.07.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option,...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 12.04.2017 20:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Stack-based buffer overflow in game-music-emu before 0.6.1.

Exploit
  • EPSS 0.31%
  • Veröffentlicht 12.04.2017 20:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

game-music-emu before 0.6.1 allows remote attackers to write to arbitrary memory locations.