Логотип exploitDog
bind:CVE-2010-1163
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2010-1163

Количество 7

Количество 7

ubuntu логотип

CVE-2010-1163

около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

CVSS2: 6.9
EPSS: Низкий
redhat логотип

CVE-2010-1163

около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

CVSS2: 6
EPSS: Низкий
nvd логотип

CVE-2010-1163

около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

CVSS2: 6.9
EPSS: Низкий
debian логотип

CVE-2010-1163

около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does ...

CVSS2: 6.9
EPSS: Низкий
github логотип

GHSA-hh7m-2j26-qw2m

около 3 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

EPSS: Низкий
oracle-oval логотип

ELSA-2010-0361

около 15 лет назад

ELSA-2010-0361: sudo security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-09415

около 15 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 6.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2010-1163

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

CVSS2: 6.9
0%
Низкий
около 15 лет назад
redhat логотип
CVE-2010-1163

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

CVSS2: 6
0%
Низкий
около 15 лет назад
nvd логотип
CVE-2010-1163

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

CVSS2: 6.9
0%
Низкий
около 15 лет назад
debian логотип
CVE-2010-1163

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does ...

CVSS2: 6.9
0%
Низкий
около 15 лет назад
github логотип
GHSA-hh7m-2j26-qw2m

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2010-0361

ELSA-2010-0361: sudo security update (MODERATE)

около 15 лет назад
fstec логотип
BDU:2015-09415

Уязвимость операционной системы Gentoo Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 6.9
0%
Низкий
около 15 лет назад

Уязвимостей на страницу