Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-792w-v225-x939

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

EPSS

Процентиль: 30%
0.0011
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

redhat
больше 20 лет назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

nvd
больше 20 лет назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

debian
больше 20 лет назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands b ...

EPSS

Процентиль: 30%
0.0011
Низкий