"-Synchronized-Data."

This commit is contained in:
CVE Team 2021-06-30 09:00:53 +00:00
parent 0be2cea782
commit 0f9998eba1
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743
2 changed files with 4 additions and 4 deletions

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.de", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2021-06-23T00:00:00.000Z", "DATE_PUBLIC": "2021-06-23T00:00:00.000Z",
"ID": "CVE-2019-18906", "ID": "CVE-2019-18906",
"STATE": "PUBLIC", "STATE": "PUBLIC",
@ -56,7 +56,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A Use of Password Hash Instead of Password for Authentication vulnerability in cryptctl of SUSE Linux Enterprise Server for SAP 12-SP5, SUSE Manager Server 4.0 allows attackers with access to the hashed password to use it without having to crack it.\nThis issue affects:\nSUSE Linux Enterprise Server for SAP 12-SP5\ncryptctl versions prior to 2.4.\nSUSE Manager Server 4.0\ncryptctl versions prior to 2.4." "value": "A Use of Password Hash Instead of Password for Authentication vulnerability in cryptctl of SUSE Linux Enterprise Server for SAP 12-SP5, SUSE Manager Server 4.0 allows attackers with access to the hashed password to use it without having to crack it. This issue affects: SUSE Linux Enterprise Server for SAP 12-SP5 cryptctl versions prior to 2.4. SUSE Manager Server 4.0 cryptctl versions prior to 2.4."
} }
] ]
}, },

View File

@ -1,6 +1,6 @@
{ {
"CVE_data_meta": { "CVE_data_meta": {
"ASSIGNER": "security@suse.de", "ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2021-06-28T00:00:00.000Z", "DATE_PUBLIC": "2021-06-28T00:00:00.000Z",
"ID": "CVE-2021-25321", "ID": "CVE-2021-25321",
"STATE": "PUBLIC", "STATE": "PUBLIC",
@ -99,7 +99,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch.\nThis issue affects:\nSUSE Linux Enterprise Server 11-SP4-LTSS\narpwatch versions prior to 2.1a15.\nSUSE Manager Server 4.0\narpwatch versions prior to 2.1a15.\nSUSE OpenStack Cloud Crowbar 9\narpwatch versions prior to 2.1a15.\nopenSUSE Factory\narpwatch version 2.1a15-169.5 and prior versions.\nopenSUSE Leap 15.2\narpwatch version 2.1a15-lp152.5.5 and prior versions." "value": "A UNIX Symbolic Link (Symlink) Following vulnerability in arpwatch of SUSE Linux Enterprise Server 11-SP4-LTSS, SUSE Manager Server 4.0, SUSE OpenStack Cloud Crowbar 9; openSUSE Factory, Leap 15.2 allows local attackers with control of the runtime user to run arpwatch as to escalate to root upon the next restart of arpwatch. This issue affects: SUSE Linux Enterprise Server 11-SP4-LTSS arpwatch versions prior to 2.1a15. SUSE Manager Server 4.0 arpwatch versions prior to 2.1a15. SUSE OpenStack Cloud Crowbar 9 arpwatch versions prior to 2.1a15. openSUSE Factory arpwatch version 2.1a15-169.5 and prior versions. openSUSE Leap 15.2 arpwatch version 2.1a15-lp152.5.5 and prior versions."
} }
] ]
}, },