Lucene search

K

Authorization Bypass

🗓️ 15 Jan 2019 08:23:54Reported by Veracode Vulnerability DatabaseType 
veracode
 veracode
🔗 sca.analysiscenter.veracode.com👁 18 Views

Authorization bypass vulnerability in sudo due to improper handling of multiple IP networks

Show more
Related
Detection
Refs
Vulners
Node
sudosudoMatch1.7.2p1_9.el5_5
OR
sudosudoMatch1.7.2p1_13.el5
OR
sudosudoMatch1.7.2p1_10.el5
OR
sudosudoMatch1.6.9p17_3.el5_3.1
OR
sudosudoMatch1.7.4p5_9.el6_2
OR
sudosudoMatch1.6.9p17_3.el5
OR
sudosudoMatch1.7.4p5_7.el6
OR
sudosudoMatch1.6.9p17_5.el5
OR
sudosudoMatch1.7.2p1_8.el5_5
OR
sudosudoMatch1.7.2p2_9.el6
OR
sudosudoMatch1.7.2p1_6.el5_5
OR
sudosudoMatch1.7.2p1_7.el5_5
OR
sudosudoMatch1.6.9p17_6.el5_4
OR
sudosudoMatch1.7.4p5_11.el6
OR
sudosudoMatch1.7.4p5_5.el6
OR
sudosudoMatch1.7.2p1_5.el5
OR
sudosudoMatch1.6.8p12_12.el5

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo