Red Hat, Inc.

4 exploits Active since Jun 2017
CVE-2021-3156 NOMISEC HIGH WORKING POC
Sudo Heap-Based Buffer Overflow
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
111 stars
CVSS 7.8
CVE-2022-0847 NOMISEC HIGH SCANNER
Dirty Pipe Local Privilege Escalation via CVE-2022-0847
A flaw was found in the way the "flags" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.
2 stars
CVSS 7.8
CVE-2021-3156 NOMISEC HIGH SCANNER
Sudo Heap-Based Buffer Overflow
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
CVSS 7.8
CVE-2016-3704 WRITEUP HIGH WRITEUP
Pulp <2.8.5 - Code Injection
Pulp before 2.8.5 uses bash's $RANDOM in an unsafe way to generate passwords.
CVSS 7.5