The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of SUSE Linux Enterprise Server

FFmpeg: four vulnerabilities
An attacker can use several vulnerabilities of FFmpeg...
CVE-2019-11338, CVE-2019-11339, CVE-2019-9718, CVE-2019-9721, DLA-1809-1, DSA-4449-1, openSUSE-SU-2020:0024-1, SUSE-SU-2019:3184-1, SUSE-SU-2019:3184-2, USN-3967-1, USN-4431-1, VIGILANCE-VUL-29236
Pallets Jinja: code execution via str.format
An attacker can use a vulnerability via str.format() of Pallets Jinja, in order to run code...
CVE-2016-10745, openSUSE-SU-2019:1395-1, openSUSE-SU-2019:1614-1, RHSA-2019:1022-01, RHSA-2019:1237-01, RHSA-2019:3964-01, RHSA-2019:4062-01, SUSE-SU-2019:1156-1, USN-4011-1, USN-4011-2, VIGILANCE-VUL-29235
Jinja2: code execution via from_string
An attacker can use a vulnerability via from_string() of Jinja2, in order to run code...
CVE-2019-8341, openSUSE-SU-2019:1395-1, openSUSE-SU-2019:1614-1, SUSE-SU-2019:1156-1, VIGILANCE-VUL-29234
389 Directory Server: denial of service via inactive connections
An attacker can keep many inactive TLS connections to 389 Directory Server, in order to block all server processes and so trigger a denial of service...
CVE-2019-3883, DLA-1779-1, RHSA-2019:1896-01, RHSA-2019:3401-01, SUSE-SU-2019:2155-1, VIGILANCE-VUL-29233
GNOME Shell: privilege escalation via a locked session
An attacker can trigger actions in GNOME Shell from the keyboard when the session is locked, in order to escalate his privileges...
CVE-2019-3820, openSUSE-SU-2019:1529-1, openSUSE-SU-2019:1582-1, RHSA-2020:1021-01, SUSE-SU-2019:1390-1, SUSE-SU-2019:1459-1, USN-3966-1, VIGILANCE-VUL-29232
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
3143907, CERTFR-2019-AVI-194, CVE-2019-11036, DLA-1803-1, DSA-4527-1, DSA-4529-1, FEDORA-2019-6350c4e21a, FEDORA-2019-6e325234a4, FEDORA-2019-bab3944fee, openSUSE-SU-2019:1501-1, openSUSE-SU-2019:1503-1, openSUSE-SU-2019:1572-1, openSUSE-SU-2019:1573-1, RHSA-2019:2519-01, RHSA-2019:3299-01, RHSA-2020:1624-01, SUSE-SU-2019:1325-1, SUSE-SU-2019:1360-1, SUSE-SU-2019:1365-1, SUSE-SU-2019:1461-1, VIGILANCE-VUL-29205
Thunderbird: information disclosure via S/MIME Signature Spoofing
An attacker can bypass access restrictions to data via S/MIME Signature Spoofing of Thunderbird, in order to obtain sensitive information...
CERTFR-2019-AVI-068, CVE-2018-18509, DLA-1678-1, DSA-4392-1, openSUSE-SU-2019:0249-1, openSUSE-SU-2019:0250-1, openSUSE-SU-2019:0251-1, openSUSE-SU-2019:1162-1, SSA:2019-045-01, SUSE-SU-2019:0469-1, SUSE-SU-2019:0853-1, USN-3897-1, VIGILANCE-VUL-28520
Enigmail: creation of fake status messages
An attacker can create fake status messages in GnuPG, in order to deceive the victime...
CVE-2018-12019, FEDORA-2018-a4bb79ea75, FEDORA-2018-fd67c19256, openSUSE-SU-2018:1706-1, openSUSE-SU-2018:1708-1, SUSE-SU-2018:2243-1, VIGILANCE-VUL-26424
Evolution: information disclosure via Spoofed OpenPGP Signatures
An attacker can bypass access restrictions to data via Spoofed OpenPGP Signatures of Evolution, in order to obtain sensitive information...
CVE-2018-15587, DLA-1766-1, DSA-4457-1, FEDORA-2019-fc866e9156, openSUSE-SU-2019:1431-1, openSUSE-SU-2019:1453-1, openSUSE-SU-2019:1528-1, RHSA-2020:1080-01, RHSA-2020:1600-01, SUSE-SU-2019:1266-1, SUSE-SU-2019:1266-2, SUSE-SU-2019:1391-1, SUSE-SU-2019:1391-2, USN-3998-1, VIGILANCE-VUL-28704
GnuPG: creation of fake status messages
An attacker can create fake status messages in GnuPG, in order to deceive the victime...
bulletinjul2018, CVE-2018-12020, DSA-2020-030, DSA-4222-1, DSA-4223-1, FEDORA-2018-4ef71d3525, FEDORA-2018-69780fc4d7, FEDORA-2018-a4e13742b4, JSA10917, openSUSE-SU-2018:1706-1, openSUSE-SU-2018:1708-1, openSUSE-SU-2018:1722-1, openSUSE-SU-2018:1724-1, RHSA-2018:2180-01, RHSA-2018:2181-01, SSA:2018-159-01, SSA:2018-170-01, SUSE-SU-2018:1696-1, SUSE-SU-2018:1698-1, SUSE-SU-2018:2243-1, T4012, USN-3675-1, USN-3675-2, USN-3675-3, USN-3964-1, VIGILANCE-VUL-26364
Our database contains other pages. You can request a free trial to read them.

Display information about SUSE Linux Enterprise Server: