diff --git a/2011/0xxx/CVE-2011-0467.json b/2011/0xxx/CVE-2011-0467.json index 596b65a8dc0..97443487439 100644 --- a/2011/0xxx/CVE-2011-0467.json +++ b/2011/0xxx/CVE-2011-0467.json @@ -54,7 +54,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability in the listing of available software of SUSE SUSE Studio Onsite, SUSE Studio Onsite 1.1 Appliance allows authenticated users to execute arbitrary SQL statements via SQL injection. Affected releases are SUSE SUSE Studio Onsite: versions prior to 1.0.3-0.18.1, SUSE Studio Onsite 1.1 Appliance: versions prior to 1.1.2-0.25.1." + "value": "A vulnerability in the listing of available software of SUSE Studio Onsite, SUSE Studio Onsite 1.1 Appliance allows authenticated users to execute arbitrary SQL statements via SQL injection. Affected releases are SUSE Studio Onsite: versions prior to 1.0.3-0.18.1, SUSE Studio Onsite 1.1 Appliance: versions prior to 1.1.2-0.25.1." } ] }, diff --git a/2011/3xxx/CVE-2011-3172.json b/2011/3xxx/CVE-2011-3172.json index 7f3d8648e0f..2ec81070430 100644 --- a/2011/3xxx/CVE-2011-3172.json +++ b/2011/3xxx/CVE-2011-3172.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability in pam_modules of SUSE SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE SUSE Linux Enterprise: versions prior to 12." + "value": "A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12." } ] }, diff --git a/2019/18xxx/CVE-2019-18898.json b/2019/18xxx/CVE-2019-18898.json index 9fff1ac4200..1431d3851fd 100644 --- a/2019/18xxx/CVE-2019-18898.json +++ b/2019/18xxx/CVE-2019-18898.json @@ -63,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "UNIX Symbolic Link (Symlink) Following vulnerability in the trousers package of SUSE SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allowed local attackers escalate privileges from user tss to root. This issue affects: SUSE SUSE Linux Enterprise Server 15 SP1 trousers versions prior to 0.3.14-6.3.1. openSUSE Factory trousers versions prior to 0.3.14-7.1." + "value": "UNIX Symbolic Link (Symlink) Following vulnerability in the trousers package of SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allowed local attackers escalate privileges from user tss to root. This issue affects: SUSE Linux Enterprise Server 15 SP1 trousers versions prior to 0.3.14-6.3.1. openSUSE Factory trousers versions prior to 0.3.14-7.1." } ] }, diff --git a/2019/3xxx/CVE-2019-3687.json b/2019/3xxx/CVE-2019-3687.json index 99b0e351a19..d4d05fa84a8 100644 --- a/2019/3xxx/CVE-2019-3687.json +++ b/2019/3xxx/CVE-2019-3687.json @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "The permission package in SUSE SUSE Linux Enterprise Server allowed all local users to run dumpcap in the \"easy\" permission profile and sniff network traffic. This issue affects: SUSE SUSE Linux Enterprise Server permissions versions starting from 85c83fef7e017f8ab7f8602d3163786d57344439 to 081d081dcfaf61710bda34bc21c80c66276119aa." + "value": "The permission package in SUSE Linux Enterprise Server allowed all local users to run dumpcap in the \"easy\" permission profile and sniff network traffic. This issue affects: SUSE Linux Enterprise Server permissions versions starting from 85c83fef7e017f8ab7f8602d3163786d57344439 to 081d081dcfaf61710bda34bc21c80c66276119aa." } ] }, diff --git a/2019/3xxx/CVE-2019-3691.json b/2019/3xxx/CVE-2019-3691.json index 07a162f877a..1cb9d04ab97 100644 --- a/2019/3xxx/CVE-2019-3691.json +++ b/2019/3xxx/CVE-2019-3691.json @@ -63,7 +63,7 @@ "description_data": [ { "lang": "eng", - "value": "A Symbolic Link (Symlink) Following vulnerability in the packaging of munge in SUSE SUSE Linux Enterprise Server 15; openSUSE Factory allowed local attackers to escalate privileges from user munge to root. This issue affects: SUSE SUSE Linux Enterprise Server 15 munge versions prior to 0.5.13-4.3.1. openSUSE Factory munge versions prior to 0.5.13-6.1." + "value": "A Symbolic Link (Symlink) Following vulnerability in the packaging of munge in SUSE Linux Enterprise Server 15; openSUSE Factory allowed local attackers to escalate privileges from user munge to root. This issue affects: SUSE Linux Enterprise Server 15 munge versions prior to 0.5.13-4.3.1. openSUSE Factory munge versions prior to 0.5.13-6.1." } ] }, diff --git a/2019/3xxx/CVE-2019-3692.json b/2019/3xxx/CVE-2019-3692.json index d17d351caf1..f3bd44f7aba 100644 --- a/2019/3xxx/CVE-2019-3692.json +++ b/2019/3xxx/CVE-2019-3692.json @@ -75,7 +75,7 @@ "description_data": [ { "lang": "eng", - "value": "The packaging of inn on SUSE SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn version 2.6.2-2.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.2.47 and prior versions." + "value": "The packaging of inn on SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn version 2.6.2-2.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.2.47 and prior versions." } ] }, diff --git a/2019/3xxx/CVE-2019-3693.json b/2019/3xxx/CVE-2019-3693.json index 0add69ee2a3..dab8ed0696f 100644 --- a/2019/3xxx/CVE-2019-3693.json +++ b/2019/3xxx/CVE-2019-3693.json @@ -75,7 +75,7 @@ "description_data": [ { "lang": "eng", - "value": "A symlink following vulnerability in the packaging of mailman in SUSE SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions." + "value": "A symlink following vulnerability in the packaging of mailman in SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman. This issue affects: SUSE Linux Enterprise Server 11 mailman versions prior to 2.1.15-9.6.15.1. SUSE Linux Enterprise Server 12 mailman versions prior to 2.1.17-3.11.1. openSUSE Leap 15.1 mailman version 2.1.29-lp151.2.14 and prior versions." } ] },