Lucene search

K
githubexploit2622835C-6D71-5CE4-975D-7E6B9E55E50E
HistoryMar 04, 2022 - 1:06 p.m.

Exploit for Off-by-one Error in Sudo Project Sudo

2022-03-0413:06:51
268
sudo project
off-by-one error
cve-2021-3156
linux x64
baron samedit
exploit
sudo permissions
heap overflow
glibc
tcache
centos
ubuntu
debian
struct defaults
root mailer
authentication bypass
exploit_nss.py
exploit_timestamp_race.c
exploit_defaults_mailer.py
exploit_userspec.py
exploit_nss_d9.py
exploit_nss_u16.py
exploit_nss_u14.py

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.961

Percentile

99.5%

CVE-2021-3156 (Sudo Baron Samedit)

This repository is CVE-202…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.961

Percentile

99.5%