CVE-2019-3693

CVE-2019-3693

A symlink following vulnerability in the packaging of mailman in SUSE SUSE Linux Enterprise Server 11, SUSE Linux Enterprise Server 12; openSUSE Leap 15.1 allowed local attackers to escalate their privileges from user wwwrun to root. Additionally arbitrary files could be changed to group mailman.
This issue affects:
SUSE SUSE Linux Enterprise Server 11
mailman versions prior to 2.1.15-9.6.15.1.
SUSE SUSE Linux Enterprise Server 12
mailman versions prior to 2.1.17-3.11.1.
openSUSE Leap 15.1
mailman version 2.1.29-lp151.2.14 and prior versions.

Source: CVE-2019-3693

CVE-2019-3687

CVE-2019-3687

The permission package in SUSE SUSE Linux Enterprise Server allowed all local users to run dumpcap in the "easy" permission profile and sniff network traffic. This issue affects: SUSE SUSE Linux Enterprise Server permissions versions starting from 85c83fef7e017f8ab7f8602d3163786d57344439 to 081d081dcfaf61710bda34bc21c80c66276119aa.

Source: CVE-2019-3687

CVE-2019-3692

CVE-2019-3692

The packaging of inn on SUSE SUSE Linux Enterprise Server 11; openSUSE Factory, Leap 15.1 allows local attackers to escalate from user inn to root via symlink attacks. This issue affects: SUSE SUSE Linux Enterprise Server 11 inn version 2.4.2-170.21.3.1 and prior versions. openSUSE Factory inn version 2.6.2-2.2 and prior versions. openSUSE Leap 15.1 inn version 2.5.4-lp151.2.47 and prior versions.

Source: CVE-2019-3692

CVE-2020-7245

CVE-2020-7245

Incorrect username validation in the registration processes of CTFd through 2.2.2 allows a remote attacker to take over an arbitrary account after initiating a password reset. This is related to register() and reset_password() in auth.py. To exploit the vulnerability, one must register with a username similar to the admin, but with spaces inserted before and after the username. This will register the account with the same username as the admin. After a reset of the password for this new account, CTFd will reset the admin account’s password due to the username collision.

Source: CVE-2020-7245

CVE-2019-17570

CVE-2019-17570

An untrusted deserialization was found in the org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult method of Apache XML-RPC (aka ws-xmlrpc) library. A malicious XML-RPC server could target a XML-RPC client causing it to execute arbitrary code. Apache XML-RPC is no longer maintained and this issue will not be fixed.

Source: CVE-2019-17570

CVE-2019-14885

CVE-2019-14885

A flaw was found in the JBoss EAP Vault system in all versions before 7.2.6.GA. Confidential information of the system property’s security attribute value is revealed in the JBoss EAP log file when executing a JBoss CLI ‘reload’ command. This flaw can lead to the exposure of confidential information.

Source: CVE-2019-14885