Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

suse — Vulnerabilities & Security Advisories 188

Browse all 188 CVE security advisories affecting suse. AI-powered Chinese analysis, POCs, and references for each vulnerability.

SUSE operates primarily as a provider of enterprise Linux distributions and cloud-native solutions, serving critical infrastructure in hybrid and multi-cloud environments. With 185 recorded CVEs, its vulnerability profile reflects the complexity of managing large-scale open-source codebases. Historically, common flaw classes include remote code execution (RCE), buffer overflows, and privilege escalation vulnerabilities, often stemming from misconfigurations or outdated dependencies within its core operating system components. Notable security characteristics involve its focus on container security and Kubernetes integration, which introduces attack surfaces related to orchestration layers. While no single catastrophic incident defines its history, the sheer volume of vulnerabilities highlights the ongoing challenge of maintaining security in widely deployed, long-term support releases. This necessitates rigorous patch management and continuous monitoring to mitigate risks associated with its extensive ecosystem of integrated services and third-party libraries.

Found 51 results / 188Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2023-22648 Rancher Labs Rancher 安全漏洞 — RancherCWE-271 8.0 High2023-06-01
CVE-2023-22651 Rancher 安全漏洞 — RancherCWE-269 9.9 Critical2023-05-04
CVE-2022-43759 Rancher: Privilege escalation via promoted roles — RancherCWE-269 7.2 High2023-02-07
CVE-2022-43758 Rancher: Command injection in Git package — RancherCWE-78 7.6 High2023-02-07
CVE-2022-43757 Rancher: Exposure of sensitive fields — RancherCWE-312 9.9 Critical2023-02-07
CVE-2022-43756 Rancher/Wrangler: Denial of service when processing Git credentials — RancherCWE-74 5.9 Medium2023-02-07
CVE-2022-43755 Rancher: Non-random authentication token — RancherCWE-331 7.1 High2023-02-07
CVE-2022-31249 [RANCHER] OS command injection in Rancher and Fleet — RancherCWE-78 7.5 High2023-02-07
CVE-2022-21953 Authenticated user can gain unauthorized shell pod and kubectl access in the local cluster — RancherCWE-862 7.4 High2023-02-07
CVE-2022-31247 Rancher: Downstream cluster privilege escalation through cluster and project role template binding (CRTB/PRTB) — RancherCWE-285 9.1 Critical2022-09-07
CVE-2021-36783 Rancher: Failure to properly sanitize credentials in cluster template answers — RancherCWE-522 9.9 Critical2022-09-07
CVE-2021-36782 Rancher: Plaintext storage and exposure of credentials in Rancher API and cluster.management.cattle.io object — RancherCWE-312 9.9 Critical2022-09-07
CVE-2022-21951 Rancher: Weave CNI password is not set if RKE template is used with CNI value overridden — RancherCWE-319 6.8 Medium2022-05-25
CVE-2021-4200 Write access to the Catalog for any user when restricted-admin role is enabled — RancherCWE-269 5.4 Medium2022-05-02
CVE-2021-36784 Privilege escalation for users with create/update permissions in Global Roles — RancherCWE-269 7.2 High2022-05-02
CVE-2021-36778 Exposure of repository credentials to external third-party sources — RancherCWE-863 7.3 High2022-05-02
CVE-2021-36776 Steve API proxy impersonation — RancherCWE-284 8.8 High2022-04-01
CVE-2021-36775 Deleting PRTBs associated to a group doesn't cause deletion of corresponding RoleBindings — RancherCWE-284 8.8 High2022-04-01
CVE-2022-21947 rancher desktop: Dashboard API is network accessible — RancherCWE-668 8.3 High2022-04-01
CVE-2021-32001 K3s/RKE2 bootstrap data is encrypted with empty string if user does not supply a token — RancherCWE-311 6.5 Medium2021-07-28
CVE-2021-25313 Rancher: XSS on /v3/cluster/ — RancherCWE-79 7.1 High2021-03-05

This page lists every published CVE security advisory associated with suse. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.