Sudo through 1.8.29 allows impersonation of nonexistent user via sud
Reporter | Title | Published | Views | Family All 57 |
---|---|---|---|---|
![]() | CVE-2019-19232 | 19 Dec 201920:37 | โ | cvelist |
![]() | CVE-2019-19232 | 19 Dec 201900:00 | โ | ubuntucve |
![]() | CentOS 8 : sudo (CESA-2020:1804) | 1 Feb 202100:00 | โ | nessus |
![]() | Photon OS 3.0: Sudo PHSA-2020-3.0-0051 | 23 Jul 202400:00 | โ | nessus |
![]() | RHEL 8 : sudo (RHSA-2020:1804) | 18 Nov 202000:00 | โ | nessus |
![]() | Photon OS 1.0: Sudo PHSA-2020-1.0-0264 | 16 Jan 202000:00 | โ | nessus |
![]() | EulerOS Virtualization for ARM 64 3.0.6.0 : sudo (EulerOS-SA-2020-1349) | 2 Apr 202000:00 | โ | nessus |
![]() | EulerOS 2.0 SP8 : sudo (EulerOS-SA-2020-1181) | 25 Feb 202000:00 | โ | nessus |
![]() | Fedora 31 : sudo (2020-8b563bc5f4) | 6 Mar 202000:00 | โ | nessus |
![]() | EulerOS 2.0 SP3 : sudo (EulerOS-SA-2020-1435) | 15 Apr 202000:00 | โ | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo