Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Backports_sle
(Opensuse)Repositories |
• https://github.com/opencontainers/runc
• https://github.com/lighttpd/lighttpd1.4 |
#Vulnerabilities | 326 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-03-22 | CVE-2020-10802 | In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability has been discovered where certain parameters are not properly escaped when generating certain queries for search actions in libraries/classes/Controllers/Table/TableSearchController.php. An attacker can generate a crafted database or table name. The attack can be performed if a user attempts certain search operations on the malicious database or table. | Debian_linux, Fedora, Backports_sle, Leap, Phpmyadmin, Package_hub | 8.0 | ||
2020-03-22 | CVE-2020-10803 | In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection vulnerability was discovered where malicious code could be used to trigger an XSS attack through retrieving and displaying results (in tbl_get_field.php and libraries/classes/Display/Results.php). The attacker must be able to insert crafted data into certain database tables, which when retrieved (for instance, through the Browse tab) can trigger the XSS attack. | Debian_linux, Fedora, Backports_sle, Leap, Phpmyadmin, Package_hub | 5.4 | ||
2020-03-31 | CVE-2019-14905 | A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues. | Fedora, Backports_sle, Leap, Ansible_engine, Ansible_tower, Ceph_storage, Cloudforms_management_engine, Openstack | 5.6 | ||
2020-04-22 | CVE-2020-12066 | CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server. | Ubuntu_linux, Debian_linux, Fedora, Backports_sle, Leap, Teeworlds | 7.5 | ||
2020-04-24 | CVE-2020-12137 | GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code. | Ubuntu_linux, Debian_linux, Fedora, Mailman, Backports_sle, Leap | 6.1 | ||
2020-04-30 | CVE-2020-12050 | SQLiteODBC 0.9996, as packaged for certain Linux distributions as 0.9996-4, has a race condition leading to root privilege escalation because any user can replace a /tmp/sqliteodbc$$ file with new contents that cause loading of an arbitrary library. | Fedora, Backports_sle, Sqliteodbc | 7.0 | ||
2020-05-06 | CVE-2020-12108 | /options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection. | Ubuntu_linux, Debian_linux, Fedora, Mailman, Backports_sle, Leap | 6.5 | ||
2020-05-19 | CVE-2020-12244 | An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. | Debian_linux, Fedora, Backports_sle, Leap, Recursor | 7.5 | ||
2020-05-19 | CVE-2020-10995 | PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect.... | Debian_linux, Fedora, Backports_sle, Leap, Recursor | 7.5 | ||
2020-01-06 | CVE-2019-18179 | An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.12, and Community Edition 5.0.x through 5.0.38 and 6.0.x through 6.0.23. An attacker who is logged into OTRS as an agent is able to list tickets assigned to other agents, even tickets in a queue where the attacker doesn't have permissions. | Debian_linux, Backports_sle, Leap, Otrs | 4.3 |