The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of SUSE Linux Enterprise Server

Google Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
CERTFR-2018-AVI-431, CVE-2018-17458, CVE-2018-17459, DSA-4297-1, openSUSE-SU-2018:2724-1, openSUSE-SU-2018:2728-1, openSUSE-SU-2018:2728-2, openSUSE-SU-2018:2754-2, RHSA-2018:2818-01, VIGILANCE-VUL-27222
mgetty: code execution via faxrunq/faxq
An attacker can use a vulnerability via faxrunq/faxq of mgetty, in order to run code...
CVE-2018-16741, DLA-1502-1, DSA-2020-030, DSA-4291-1, FEDORA-2019-3d38ab031e, FEDORA-2019-da586db907, openSUSE-SU-2018:2942-1, openSUSE-SU-2018:3108-1, SUSE-SU-2018:2850-1, SUSE-SU-2018:2894-1, SUSE-SU-2018:2979-1, VIGILANCE-VUL-27218
Okular: directory traversal
An attacker can traverse directories of Okular, in order to read a file outside the service root path...
CVE-2018-1000801, DLA-1516-1, DSA-4303-1, FEDORA-2018-dbeb27d783, FEDORA-2018-de7ad09860, openSUSE-SU-2018:2727-1, openSUSE-SU-2018:2733-1, openSUSE-SU-2018:2733-2, VIGILANCE-VUL-27210
Zsh: code execution via Shebang Line Substring
An attacker can use a vulnerability via Shebang Line Substring of Zsh, in order to run code...
CVE-2018-13259, FEDORA-2018-16bb8b00c5, FEDORA-2018-8b1b2373b4, openSUSE-SU-2018:2741-1, openSUSE-SU-2018:2966-1, RHSA-2019:2017-01, SUSE-SU-2018:2686-1, USN-3764-1, VIGILANCE-VUL-27209
Zsh: code execution via Shebang Line Special Char
An attacker can use a vulnerability via Shebang Line Special Char of Zsh, in order to run code...
CVE-2018-0502, FEDORA-2018-16bb8b00c5, FEDORA-2018-8b1b2373b4, openSUSE-SU-2018:2741-1, openSUSE-SU-2018:2966-1, SUSE-SU-2018:2686-1, USN-3764-1, VIGILANCE-VUL-27208
Linux kernel: information disclosure via AF_VSOCK
A local attacker can read a memory fragment via AF_VSOCK of the Linux kernel, in order to obtain sensitive information...
1103505, 1619846, CERTFR-2019-AVI-035, CERTFR-2019-AVI-038, CERTFR-2019-AVI-041, CERTFR-2019-AVI-042, CERTFR-2019-AVI-044, CERTFR-2019-AVI-621, CVE-2018-14625, DLA-1771-1, FEDORA-2018-2645eb8dab, FEDORA-2018-6e8c330d50, openSUSE-SU-2019:0065-1, RHSA-2019:2029-01, RHSA-2019:2043-01, RHSA-2019:4154-01, SUSE-SU-2019:0196-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0224-1, USN-3871-1, USN-3871-2, USN-3871-3, USN-3871-4, USN-3871-5, USN-3872-1, USN-3878-1, USN-3878-2, VIGILANCE-VUL-27200
Linux kernel: information disclosure via cdrom_ioctl_drive_status
An attacker can bypass access restrictions to data via cdrom_ioctl_drive_status() of the Linux kernel, in order to obtain sensitive information...
1103505, CERTFR-2018-AVI-456, CERTFR-2018-AVI-459, CERTFR-2018-AVI-460, CERTFR-2018-AVI-466, CERTFR-2018-AVI-480, CERTFR-2018-AVI-508, CERTFR-2018-AVI-557, CERTFR-2019-AVI-188, CERTFR-2019-AVI-621, CVE-2018-16658, DLA-1529-1, DLA-1531-1, DSA-4308-1, FEDORA-2018-59e4747e0f, K40523020, openSUSE-SU-2018:2738-1, openSUSE-SU-2018:3071-1, RHSA-2019:2029-01, RHSA-2019:2043-01, RHSA-2019:4154-01, SUSE-SU-2018:2858-1, SUSE-SU-2018:2862-1, SUSE-SU-2018:2879-1, SUSE-SU-2018:2907-1, SUSE-SU-2018:2908-1, SUSE-SU-2018:2908-2, SUSE-SU-2018:2980-1, SUSE-SU-2018:3083-1, SUSE-SU-2018:3084-1, SUSE-SU-2018:3088-1, USN-3797-1, USN-3797-2, USN-3820-1, USN-3820-2, USN-3820-3, USN-3822-1, USN-3822-2, VIGILANCE-VUL-27186
Apache httpd mod_perl: code execution via htaccess
An attacker can use a vulnerability via htaccess of Apache httpd mod_perl, in order to run code...
644169, CVE-2011-2767, DLA-1507-1, FEDORA-2018-a94668408d, openSUSE-SU-2019:2549-1, openSUSE-SU-2019:2558-1, RHSA-2018:2737-01, RHSA-2018:2825-01, RHSA-2018:2826-01, SUSE-SU-2019:3213-1, SUSE-SU-2020:14266-1, USN-3825-1, USN-3825-2, VIGILANCE-VUL-27182
GraphicsMagick: information disclosure via ReadXBMImage
An attacker can bypass access restrictions to data via ReadXBMImage() of GraphicsMagick, in order to obtain sensitive information...
bulletinoct2018, CVE-2018-16323, openSUSE-SU-2018:2672-1, openSUSE-SU-2018:2811-1, openSUSE-SU-2018:3014-1, SUSE-SU-2018:2778-1, SUSE-SU-2018:2977-1, SUSE-SU-2018:3269-1, SUSE-SU-2018:3348-1, USN-3785-1, USN-4034-1, VIGILANCE-VUL-27181
Ghostscript: nine vulnerabilities
An attacker can use several vulnerabilities of Ghostscript...
CVE-2018-16510, CVE-2018-16511, CVE-2018-16513, CVE-2018-16539, CVE-2018-16540, CVE-2018-16541, CVE-2018-16542, CVE-2018-16543, CVE-2018-16585, DLA-1504-1, DLA-1527-1, DLA-1527-2, DSA-4288-1, FEDORA-2018-28447b6f2e, FEDORA-2018-56221eb24b, FEDORA-2018-f1b1ed38b3, openSUSE-SU-2018:3036-1, openSUSE-SU-2018:3038-1, RHSA-2018:2918-01, RHSA-2018:3650-01, RHSA-2018:3834-01, RHSA-2019:0229-01, SA44101, SUSE-SU-2018:2975-1, SUSE-SU-2018:2976-1, SUSE-SU-2018:3330-1, USN-3768-1, USN-3773-1, VIGILANCE-VUL-27180
Our database contains other pages. You can request a free trial to read them.

Display information about SUSE Linux Enterprise Server: