Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36455 | mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges. |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 19 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 |
Sat, 19 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-732 |
Thu, 17 Oct 2024 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 16 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Suse
Suse opensuse Tumbleweed |
|
| CPEs | cpe:2.3:a:suse:opensuse_tumbleweed:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Suse
Suse opensuse Tumbleweed |
|
| Metrics |
cvssV3_1
|
Wed, 16 Oct 2024 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges. | |
| Title | mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2025-03-19T14:39:07.458Z
Reserved: 2023-05-04T08:30:59.321Z
Link: CVE-2023-32190
Updated: 2024-10-16T16:08:01.523Z
Status : Deferred
Published: 2024-10-16T12:15:07.460
Modified: 2026-04-15T00:35:42.020
Link: CVE-2023-32190
OpenCVE Enrichment
No data.
EUVD