Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/sudo@1.5.6p2-2
Typedeb
Namespacedebian
Namesudo
Version1.5.6p2-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.9.17p2-5
Latest_non_vulnerable_version1.9.17p2-5
Affected_by_vulnerabilities
0
url VCID-1cuy-x9m9-p3c4
vulnerability_id VCID-1cuy-x9m9-p3c4
summary
Multiple vulnerabilities have been found in sudo, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3156.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3156.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3156
reference_id
reference_type
scores
0
value 0.92309
scoring_system epss
scoring_elements 0.99722
published_at 2026-04-18T12:55:00Z
1
value 0.92309
scoring_system epss
scoring_elements 0.99721
published_at 2026-04-12T12:55:00Z
2
value 0.92309
scoring_system epss
scoring_elements 0.9972
published_at 2026-04-13T12:55:00Z
3
value 0.92483
scoring_system epss
scoring_elements 0.9973
published_at 2026-04-02T12:55:00Z
4
value 0.92483
scoring_system epss
scoring_elements 0.99733
published_at 2026-04-07T12:55:00Z
5
value 0.92483
scoring_system epss
scoring_elements 0.99732
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3156
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2021/01/27/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://www.openwall.com/lists/oss-security/2021/01/27/1
5
reference_url http://www.openwall.com/lists/oss-security/2021/02/15/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://www.openwall.com/lists/oss-security/2021/02/15/1
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1917684
reference_id 1917684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1917684
7
reference_url http://www.openwall.com/lists/oss-security/2021/01/27/2
reference_id 2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://www.openwall.com/lists/oss-security/2021/01/27/2
8
reference_url http://seclists.org/fulldisclosure/2024/Feb/3
reference_id 3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://seclists.org/fulldisclosure/2024/Feb/3
9
reference_url https://www.openwall.com/lists/oss-security/2021/01/26/3
reference_id 3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://www.openwall.com/lists/oss-security/2021/01/26/3
10
reference_url http://www.openwall.com/lists/oss-security/2021/01/26/3
reference_id 3
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://www.openwall.com/lists/oss-security/2021/01/26/3
11
reference_url http://seclists.org/fulldisclosure/2021/Feb/42
reference_id 42
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://seclists.org/fulldisclosure/2021/Feb/42
12
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/6
reference_id 6
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/6
13
reference_url http://seclists.org/fulldisclosure/2021/Jan/79
reference_id 79
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://seclists.org/fulldisclosure/2021/Jan/79
14
reference_url https://www.kb.cert.org/vuls/id/794544
reference_id 794544
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://www.kb.cert.org/vuls/id/794544
15
reference_url http://www.openwall.com/lists/oss-security/2024/01/30/8
reference_id 8
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://www.openwall.com/lists/oss-security/2024/01/30/8
16
reference_url https://security.archlinux.org/ASA-202101-25
reference_id ASA-202101-25
reference_type
scores
url https://security.archlinux.org/ASA-202101-25
17
reference_url https://security.archlinux.org/AVG-1431
reference_id AVG-1431
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1431
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII/
reference_id CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII/
19
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM
reference_id cisco-sa-sudo-privesc-jan2021-qnYQfcM
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM
20
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/49521.py
reference_id CVE-2021-3156
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/49521.py
21
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/49522.c
reference_id CVE-2021-3156
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/49522.c
22
reference_url https://www.debian.org/security/2021/dsa-4839
reference_id dsa-4839
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://www.debian.org/security/2021/dsa-4839
23
reference_url http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
reference_id glibc-syslog-Heap-Based-Buffer-Overflow.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
24
reference_url https://security.gentoo.org/glsa/202101-33
reference_id GLSA-202101-33
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://security.gentoo.org/glsa/202101-33
25
reference_url https://support.apple.com/kb/HT212177
reference_id HT212177
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://support.apple.com/kb/HT212177
26
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10348
reference_id index?page=content&id=SB10348
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://kc.mcafee.com/corporate/index?page=content&id=SB10348
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY/
reference_id LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY/
28
reference_url https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html
reference_id msg00022.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html
29
reference_url https://security.netapp.com/advisory/ntap-20210128-0001/
reference_id ntap-20210128-0001
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://security.netapp.com/advisory/ntap-20210128-0001/
30
reference_url https://security.netapp.com/advisory/ntap-20210128-0002/
reference_id ntap-20210128-0002
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://security.netapp.com/advisory/ntap-20210128-0002/
31
reference_url https://access.redhat.com/errata/RHSA-2021:0218
reference_id RHSA-2021:0218
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0218
32
reference_url https://access.redhat.com/errata/RHSA-2021:0219
reference_id RHSA-2021:0219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0219
33
reference_url https://access.redhat.com/errata/RHSA-2021:0220
reference_id RHSA-2021:0220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0220
34
reference_url https://access.redhat.com/errata/RHSA-2021:0221
reference_id RHSA-2021:0221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0221
35
reference_url https://access.redhat.com/errata/RHSA-2021:0222
reference_id RHSA-2021:0222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0222
36
reference_url https://access.redhat.com/errata/RHSA-2021:0223
reference_id RHSA-2021:0223
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0223
37
reference_url https://access.redhat.com/errata/RHSA-2021:0224
reference_id RHSA-2021:0224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0224
38
reference_url https://access.redhat.com/errata/RHSA-2021:0225
reference_id RHSA-2021:0225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0225
39
reference_url https://access.redhat.com/errata/RHSA-2021:0226
reference_id RHSA-2021:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0226
40
reference_url https://access.redhat.com/errata/RHSA-2021:0227
reference_id RHSA-2021:0227
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0227
41
reference_url https://access.redhat.com/errata/RHSA-2021:0395
reference_id RHSA-2021:0395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0395
42
reference_url https://access.redhat.com/errata/RHSA-2021:0401
reference_id RHSA-2021:0401
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0401
43
reference_url https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability
reference_id security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability
44
reference_url https://www.sudo.ws/stable.html#1.9.5p2
reference_id stable.html#1.9.5p2
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://www.sudo.ws/stable.html#1.9.5p2
45
reference_url http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html
reference_id Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html
46
reference_url http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html
reference_id Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html
47
reference_url http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html
reference_id Sudo-Buffer-Overflow-Privilege-Escalation.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html
48
reference_url https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156
reference_id sudoedit-pwned-cve-2021-3156
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156
49
reference_url http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html
reference_id Sudo-Heap-Based-Buffer-Overflow.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html
50
reference_url https://www.synology.com/security/advisory/Synology_SA_21_02
reference_id Synology_SA_21_02
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/
url https://www.synology.com/security/advisory/Synology_SA_21_02
51
reference_url https://usn.ubuntu.com/4705-1/
reference_id USN-4705-1
reference_type
scores
url https://usn.ubuntu.com/4705-1/
52
reference_url https://usn.ubuntu.com/4705-2/
reference_id USN-4705-2
reference_type
scores
url https://usn.ubuntu.com/4705-2/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
purl pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-enw3-mnnx-myd5
5
vulnerability VCID-esf1-4zw7-5fcy
6
vulnerability VCID-ethj-8jmj-5fdh
7
vulnerability VCID-k42r-mk4h-mbbg
8
vulnerability VCID-ngg5-bqw7-bbc4
9
vulnerability VCID-p5yv-48ry-dfe7
10
vulnerability VCID-pj45-2vrx-6fcv
11
vulnerability VCID-pyfy-88dw-9ba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.27-1%252Bdeb10u3
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2021-3156
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1cuy-x9m9-p3c4
1
url VCID-1s26-jrut-puf4
vulnerability_id VCID-1s26-jrut-puf4
summary CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)
references
0
reference_url http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
1
reference_url http://marc.info/?l=bugtraq&m=110028877431192&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110028877431192&w=2
2
reference_url http://marc.info/?l=bugtraq&m=110598298225675&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110598298225675&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1051.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1051.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1051
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50907
published_at 2026-04-18T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50765
published_at 2026-04-01T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50821
published_at 2026-04-02T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50847
published_at 2026-04-04T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50804
published_at 2026-04-07T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50861
published_at 2026-04-08T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50859
published_at 2026-04-09T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50901
published_at 2026-04-11T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50879
published_at 2026-04-12T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50863
published_at 2026-04-13T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.509
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1051
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18055
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18055
7
reference_url https://www.ubuntu.com/usn/usn-28-1/
reference_id
reference_type
scores
url https://www.ubuntu.com/usn/usn-28-1/
8
reference_url http://www.debian.org/security/2004/dsa-596
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-596
9
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:133
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:133
10
reference_url http://www.securityfocus.com/bid/11668
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11668
11
reference_url http://www.sudo.ws/sudo/alerts/bash_functions.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/bash_functions.html
12
reference_url http://www.trustix.org/errata/2004/0061/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2004/0061/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=139478
reference_id 139478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=139478
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1051
reference_id CVE-2004-1051
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1051
fixed_packages
0
url pkg:deb/debian/sudo@1.6.8p7-1.4
purl pkg:deb/debian/sudo@1.6.8p7-1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-a4dr-ann4-hffe
16
vulnerability VCID-buyq-ggky-qbhh
17
vulnerability VCID-cc9y-weez-hkhu
18
vulnerability VCID-e6kf-aksq-ffbe
19
vulnerability VCID-enw3-mnnx-myd5
20
vulnerability VCID-esf1-4zw7-5fcy
21
vulnerability VCID-ethj-8jmj-5fdh
22
vulnerability VCID-fant-y91b-rubf
23
vulnerability VCID-hac2-bg9e-bfbr
24
vulnerability VCID-j63t-xqk3-p3dk
25
vulnerability VCID-j8m8-5uq3-a7a2
26
vulnerability VCID-jf9c-5due-6feb
27
vulnerability VCID-k42r-mk4h-mbbg
28
vulnerability VCID-kzje-6t7q-rudw
29
vulnerability VCID-mfty-hg4q-x7hp
30
vulnerability VCID-ngg5-bqw7-bbc4
31
vulnerability VCID-p5yv-48ry-dfe7
32
vulnerability VCID-pj45-2vrx-6fcv
33
vulnerability VCID-pyfy-88dw-9ba8
34
vulnerability VCID-qrfs-x7be-u7dx
35
vulnerability VCID-qs5z-f2ew-n7fv
36
vulnerability VCID-rm1k-u2gs-efbx
37
vulnerability VCID-t9g1-j9ej-ufcq
38
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p7-1.4
aliases CVE-2004-1051
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1s26-jrut-puf4
2
url VCID-2b4p-nehx-eyae
vulnerability_id VCID-2b4p-nehx-eyae
summary coreutils: tty hijacking possible in "su" via TIOCSTI ioctl
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4890.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4890.json
1
reference_url https://access.redhat.com/security/cve/cve-2005-4890
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2005-4890
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4890
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33203
published_at 2026-04-18T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33185
published_at 2026-04-13T12:55:00Z
2
value 0.00135
scoring_system epss
scoring_elements 0.33226
published_at 2026-04-16T12:55:00Z
3
value 0.00135
scoring_system epss
scoring_elements 0.33176
published_at 2026-04-01T12:55:00Z
4
value 0.00135
scoring_system epss
scoring_elements 0.33304
published_at 2026-04-02T12:55:00Z
5
value 0.00135
scoring_system epss
scoring_elements 0.33336
published_at 2026-04-04T12:55:00Z
6
value 0.00135
scoring_system epss
scoring_elements 0.33169
published_at 2026-04-07T12:55:00Z
7
value 0.00135
scoring_system epss
scoring_elements 0.33212
published_at 2026-04-08T12:55:00Z
8
value 0.00135
scoring_system epss
scoring_elements 0.33246
published_at 2026-04-09T12:55:00Z
9
value 0.00135
scoring_system epss
scoring_elements 0.33249
published_at 2026-04-11T12:55:00Z
10
value 0.00135
scoring_system epss
scoring_elements 0.33209
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4890
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4890
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security-tracker.debian.org/tracker/CVE-2005-4890
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2005-4890
7
reference_url http://www.openwall.com/lists/oss-security/2012/11/06/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/11/06/8
8
reference_url http://www.openwall.com/lists/oss-security/2013/05/20/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/05/20/3
9
reference_url http://www.openwall.com/lists/oss-security/2013/11/28/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/11/28/10
10
reference_url http://www.openwall.com/lists/oss-security/2013/11/29/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/11/29/5
11
reference_url http://www.openwall.com/lists/oss-security/2014/10/20/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/10/20/9
12
reference_url http://www.openwall.com/lists/oss-security/2014/10/21/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/10/21/1
13
reference_url http://www.openwall.com/lists/oss-security/2014/12/15/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2014/12/15/5
14
reference_url http://www.openwall.com/lists/oss-security/2016/02/25/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/25/6
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843
reference_id 628843
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657784
reference_id 657784
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657784
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=710208
reference_id 710208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=710208
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:shadow:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:debian:shadow:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:debian:shadow:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4890
reference_id CVE-2005-4890
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2005-4890
fixed_packages
0
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
aliases CVE-2005-4890
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b4p-nehx-eyae
3
url VCID-2jvq-feqm-rueb
vulnerability_id VCID-2jvq-feqm-rueb
summary
A vulnerability has been found in sudo allowing a local attacker to
    gain elevated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0106.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0106
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16167
published_at 2026-04-01T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.16351
published_at 2026-04-02T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16412
published_at 2026-04-04T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16209
published_at 2026-04-07T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16295
published_at 2026-04-08T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16359
published_at 2026-04-09T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16341
published_at 2026-04-11T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16301
published_at 2026-04-12T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16233
published_at 2026-04-13T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.1617
published_at 2026-04-16T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.16188
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1071780
reference_id 1071780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1071780
4
reference_url https://security.gentoo.org/glsa/201406-30
reference_id GLSA-201406-30
reference_type
scores
url https://security.gentoo.org/glsa/201406-30
5
reference_url https://access.redhat.com/errata/RHSA-2014:0266
reference_id RHSA-2014:0266
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0266
6
reference_url https://usn.ubuntu.com/2146-1/
reference_id USN-2146-1
reference_type
scores
url https://usn.ubuntu.com/2146-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
aliases CVE-2014-0106
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jvq-feqm-rueb
4
url VCID-3hfe-p6e3-tbe9
vulnerability_id VCID-3hfe-p6e3-tbe9
summary Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28487.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28487
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29098
published_at 2026-04-02T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.333
published_at 2026-04-07T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33344
published_at 2026-04-08T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33378
published_at 2026-04-09T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33381
published_at 2026-04-11T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33339
published_at 2026-04-12T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33316
published_at 2026-04-13T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33356
published_at 2026-04-16T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33332
published_at 2026-04-18T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33462
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28487
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28487
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179273
reference_id 2179273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179273
5
reference_url https://security.gentoo.org/glsa/202309-12
reference_id GLSA-202309-12
reference_type
scores
url https://security.gentoo.org/glsa/202309-12
6
reference_url https://access.redhat.com/errata/RHSA-2024:0811
reference_id RHSA-2024:0811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0811
7
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
8
reference_url https://usn.ubuntu.com/6005-1/
reference_id USN-6005-1
reference_type
scores
url https://usn.ubuntu.com/6005-1/
9
reference_url https://usn.ubuntu.com/6005-2/
reference_id USN-6005-2
reference_type
scores
url https://usn.ubuntu.com/6005-2/
fixed_packages
0
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3
aliases CVE-2023-28487
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hfe-p6e3-tbe9
5
url VCID-49cf-c1kh-27cf
vulnerability_id VCID-49cf-c1kh-27cf
summary
Two vulnerabilities have been discovered in sudo, allowing local
    attackers to possibly gain escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0809.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0809
reference_id
reference_type
scores
0
value 0.45602
scoring_system epss
scoring_elements 0.97591
published_at 2026-04-01T12:55:00Z
1
value 0.45602
scoring_system epss
scoring_elements 0.97598
published_at 2026-04-02T12:55:00Z
2
value 0.45602
scoring_system epss
scoring_elements 0.976
published_at 2026-04-04T12:55:00Z
3
value 0.45602
scoring_system epss
scoring_elements 0.97601
published_at 2026-04-07T12:55:00Z
4
value 0.45602
scoring_system epss
scoring_elements 0.97607
published_at 2026-04-08T12:55:00Z
5
value 0.45602
scoring_system epss
scoring_elements 0.9761
published_at 2026-04-09T12:55:00Z
6
value 0.45602
scoring_system epss
scoring_elements 0.97612
published_at 2026-04-11T12:55:00Z
7
value 0.45602
scoring_system epss
scoring_elements 0.97614
published_at 2026-04-12T12:55:00Z
8
value 0.45602
scoring_system epss
scoring_elements 0.97615
published_at 2026-04-13T12:55:00Z
9
value 0.45602
scoring_system epss
scoring_elements 0.97623
published_at 2026-04-16T12:55:00Z
10
value 0.45602
scoring_system epss
scoring_elements 0.97626
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0809
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657985
reference_id 657985
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657985
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=784443
reference_id 784443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=784443
5
reference_url http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt
reference_id CVE-2012-0809;OSVDB-78659
reference_type exploit
scores
url http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/25134.c
reference_id CVE-2012-0809;OSVDB-78659
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/25134.c
7
reference_url https://security.gentoo.org/glsa/201203-06
reference_id GLSA-201203-06
reference_type
scores
url https://security.gentoo.org/glsa/201203-06
8
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18436.txt
reference_id OSVDB-78659;CVE-2012-0809
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18436.txt
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
aliases CVE-2012-0809
risk_score 0.8
exploitability 2.0
weighted_severity 0.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49cf-c1kh-27cf
6
url VCID-5h2a-syy6-67bn
vulnerability_id VCID-5h2a-syy6-67bn
summary
Multiple vulnerabilities have been found in sudo which could result
    in privilege escalation.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-1353.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1353.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1776.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1776.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1776
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15343
published_at 2026-04-18T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.1551
published_at 2026-04-01T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15553
published_at 2026-04-02T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15622
published_at 2026-04-04T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15421
published_at 2026-04-07T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15508
published_at 2026-04-08T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15558
published_at 2026-04-09T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15522
published_at 2026-04-11T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15484
published_at 2026-04-12T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15418
published_at 2026-04-13T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15338
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1776
6
reference_url https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://www.debian.org/security/2013/dsa-2642
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2642
11
reference_url http://www.openwall.com/lists/oss-security/2013/02/27/31
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/27/31
12
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
13
reference_url http://www.securityfocus.com/bid/58207
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58207
14
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
15
reference_url http://www.sudo.ws/repos/sudo/rev/632f8e028191
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/632f8e028191
16
reference_url http://www.sudo.ws/repos/sudo/rev/6b22be4d09f0
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/6b22be4d09f0
17
reference_url http://www.sudo.ws/sudo/alerts/tty_tickets.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/tty_tickets.html
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
reference_id 701839
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=916365
reference_id 916365
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=916365
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1776
reference_id CVE-2013-1776
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-1776
86
reference_url https://security.gentoo.org/glsa/201401-23
reference_id GLSA-201401-23
reference_type
scores
url https://security.gentoo.org/glsa/201401-23
87
reference_url https://access.redhat.com/errata/RHSA-2013:1353
reference_id RHSA-2013:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1353
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
aliases CVE-2013-1776
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5h2a-syy6-67bn
7
url VCID-71wy-ujxu-bbfj
vulnerability_id VCID-71wy-ujxu-bbfj
summary sudo: noexec bypass via wordexp()
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2872.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2872.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7076.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7076.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7076
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22873
published_at 2026-04-01T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.22935
published_at 2026-04-18T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23019
published_at 2026-04-11T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.22982
published_at 2026-04-12T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22926
published_at 2026-04-13T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22941
published_at 2026-04-16T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23042
published_at 2026-04-02T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23086
published_at 2026-04-04T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.22876
published_at 2026-04-07T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.22948
published_at 2026-04-08T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7076
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://security.netapp.com/advisory/ntap-20181127-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20181127-0002/
7
reference_url https://www.sudo.ws/alerts/noexec_wordexp.html
reference_id
reference_type
scores
url https://www.sudo.ws/alerts/noexec_wordexp.html
8
reference_url http://www.securityfocus.com/bid/95778
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95778
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1384982
reference_id 1384982
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1384982
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842507
reference_id 842507
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842507
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-7076
reference_id CVE-2016-7076
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
2
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-7076
13
reference_url https://access.redhat.com/errata/RHSA-2016:2872
reference_id RHSA-2016:2872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2872
14
reference_url https://usn.ubuntu.com/3968-1/
reference_id USN-3968-1
reference_type
scores
url https://usn.ubuntu.com/3968-1/
15
reference_url https://usn.ubuntu.com/3968-3/
reference_id USN-3968-3
reference_type
scores
url https://usn.ubuntu.com/3968-3/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
purl pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-9y5c-e765-tqgt
5
vulnerability VCID-enw3-mnnx-myd5
6
vulnerability VCID-esf1-4zw7-5fcy
7
vulnerability VCID-ethj-8jmj-5fdh
8
vulnerability VCID-k42r-mk4h-mbbg
9
vulnerability VCID-ngg5-bqw7-bbc4
10
vulnerability VCID-p5yv-48ry-dfe7
11
vulnerability VCID-pj45-2vrx-6fcv
12
vulnerability VCID-pyfy-88dw-9ba8
13
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2
aliases CVE-2016-7076
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71wy-ujxu-bbfj
8
url VCID-7duq-41ag-z7bk
vulnerability_id VCID-7duq-41ag-z7bk
summary
Two vulnerabilities in sudo might allow local users to escalate privileges
    and execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0427.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0427
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.2305
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23214
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23258
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23048
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23122
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23174
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23195
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23158
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.231
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23115
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23107
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0427
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=567622
reference_id 567622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=567622
4
reference_url https://security.gentoo.org/glsa/201003-01
reference_id GLSA-201003-01
reference_type
scores
url https://security.gentoo.org/glsa/201003-01
5
reference_url https://access.redhat.com/errata/RHSA-2010:0122
reference_id RHSA-2010:0122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0122
6
reference_url https://usn.ubuntu.com/905-1/
reference_id USN-905-1
reference_type
scores
url https://usn.ubuntu.com/905-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
aliases CVE-2010-0427
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7duq-41ag-z7bk
9
url VCID-7w9w-4whw-9bgk
vulnerability_id VCID-7w9w-4whw-9bgk
summary
Multiple vulnerabilities have been found in sudo, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23240.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23240
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.45118
published_at 2026-04-01T12:55:00Z
1
value 0.00225
scoring_system epss
scoring_elements 0.45254
published_at 2026-04-18T12:55:00Z
2
value 0.00225
scoring_system epss
scoring_elements 0.45208
published_at 2026-04-13T12:55:00Z
3
value 0.00225
scoring_system epss
scoring_elements 0.4526
published_at 2026-04-16T12:55:00Z
4
value 0.00225
scoring_system epss
scoring_elements 0.45199
published_at 2026-04-02T12:55:00Z
5
value 0.00225
scoring_system epss
scoring_elements 0.45222
published_at 2026-04-04T12:55:00Z
6
value 0.00225
scoring_system epss
scoring_elements 0.45164
published_at 2026-04-07T12:55:00Z
7
value 0.00225
scoring_system epss
scoring_elements 0.45218
published_at 2026-04-09T12:55:00Z
8
value 0.00225
scoring_system epss
scoring_elements 0.45239
published_at 2026-04-11T12:55:00Z
9
value 0.00225
scoring_system epss
scoring_elements 0.45206
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1915053
reference_id 1915053
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1915053
5
reference_url https://security.archlinux.org/AVG-1432
reference_id AVG-1432
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1432
6
reference_url https://security.gentoo.org/glsa/202101-33
reference_id GLSA-202101-33
reference_type
scores
url https://security.gentoo.org/glsa/202101-33
7
reference_url https://access.redhat.com/errata/RHSA-2021:1723
reference_id RHSA-2021:1723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1723
fixed_packages
0
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2021-23240
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7w9w-4whw-9bgk
10
url VCID-8r7f-bt93-qqcq
vulnerability_id VCID-8r7f-bt93-qqcq
summary sudo: Race condition when checking digests in sudoers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8239.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8239.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8239
reference_id
reference_type
scores
0
value 0.00876
scoring_system epss
scoring_elements 0.75342
published_at 2026-04-18T12:55:00Z
1
value 0.00876
scoring_system epss
scoring_elements 0.75296
published_at 2026-04-13T12:55:00Z
2
value 0.00876
scoring_system epss
scoring_elements 0.75336
published_at 2026-04-16T12:55:00Z
3
value 0.00876
scoring_system epss
scoring_elements 0.75243
published_at 2026-04-01T12:55:00Z
4
value 0.00876
scoring_system epss
scoring_elements 0.75246
published_at 2026-04-02T12:55:00Z
5
value 0.00876
scoring_system epss
scoring_elements 0.75278
published_at 2026-04-04T12:55:00Z
6
value 0.00876
scoring_system epss
scoring_elements 0.75255
published_at 2026-04-07T12:55:00Z
7
value 0.00876
scoring_system epss
scoring_elements 0.75298
published_at 2026-04-08T12:55:00Z
8
value 0.00876
scoring_system epss
scoring_elements 0.75308
published_at 2026-04-12T12:55:00Z
9
value 0.00876
scoring_system epss
scoring_elements 0.75329
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8239
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8239
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.sudo.ws/repos/sudo/rev/0cd3cc8fa195
reference_id
reference_type
scores
url https://www.sudo.ws/repos/sudo/rev/0cd3cc8fa195
5
reference_url https://www.sudo.ws/repos/sudo/rev/24a3d9215c64
reference_id
reference_type
scores
url https://www.sudo.ws/repos/sudo/rev/24a3d9215c64
6
reference_url https://www.sudo.ws/repos/sudo/rev/397722cdd7ec
reference_id
reference_type
scores
url https://www.sudo.ws/repos/sudo/rev/397722cdd7ec
7
reference_url http://www.openwall.com/lists/oss-security/2015/11/18/22
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/18/22
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1283635
reference_id 1283635
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1283635
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805563
reference_id 805563
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805563
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b2:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b3:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b4:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:b4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b4:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p1:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p2:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p3:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc1:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc2:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.10:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc3:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b1:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b2:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b3:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b4:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:b4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b4:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:p1:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:p2:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:rc1:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.11:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:rc2:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.12:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b1:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.12:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b2:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.12:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b3:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.12:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:rc1:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.12:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:rc2:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.13:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b1:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.13:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b2:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.13:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b3:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b4:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.13:b4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b4:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.13:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:rc1:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.13:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:rc2:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b2:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b3:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b4:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:b4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b4:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p1:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p2:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p3:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.14:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:rc1:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b1:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b2:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b3:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b4:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:b4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b4:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b5:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:b5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b5:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc1:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc2:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.15:rc3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc3:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.8:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b1:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.8:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b2:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.8:b3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b3:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.8:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:rc1:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:b1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:b1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:b1:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:b2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:b2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:b2:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:p1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p1:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p2:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p3:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p4:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:p4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p4:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p5:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:p5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p5:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:rc1:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:rc2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:1.8.9:rc2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:rc2:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8239
reference_id CVE-2015-8239
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8239
fixed_packages
0
url pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
purl pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-9y5c-e765-tqgt
5
vulnerability VCID-enw3-mnnx-myd5
6
vulnerability VCID-esf1-4zw7-5fcy
7
vulnerability VCID-ethj-8jmj-5fdh
8
vulnerability VCID-k42r-mk4h-mbbg
9
vulnerability VCID-ngg5-bqw7-bbc4
10
vulnerability VCID-p5yv-48ry-dfe7
11
vulnerability VCID-pj45-2vrx-6fcv
12
vulnerability VCID-pyfy-88dw-9ba8
13
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2
aliases CVE-2015-8239
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8r7f-bt93-qqcq
11
url VCID-9a7y-2e2u-ebbf
vulnerability_id VCID-9a7y-2e2u-ebbf
summary
sudo is vulnerable to an escalation of privileges via a symlink
    attack.
references
0
reference_url http://bugzilla.sudo.ws/show_bug.cgi?id=707
reference_id
reference_type
scores
url http://bugzilla.sudo.ws/show_bug.cgi?id=707
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5602.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5602.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5602
reference_id
reference_type
scores
0
value 0.05506
scoring_system epss
scoring_elements 0.90252
published_at 2026-04-18T12:55:00Z
1
value 0.05506
scoring_system epss
scoring_elements 0.9019
published_at 2026-04-01T12:55:00Z
2
value 0.05506
scoring_system epss
scoring_elements 0.90193
published_at 2026-04-02T12:55:00Z
3
value 0.05506
scoring_system epss
scoring_elements 0.90205
published_at 2026-04-04T12:55:00Z
4
value 0.05506
scoring_system epss
scoring_elements 0.9021
published_at 2026-04-07T12:55:00Z
5
value 0.05506
scoring_system epss
scoring_elements 0.90226
published_at 2026-04-08T12:55:00Z
6
value 0.05506
scoring_system epss
scoring_elements 0.90232
published_at 2026-04-09T12:55:00Z
7
value 0.05506
scoring_system epss
scoring_elements 0.90241
published_at 2026-04-11T12:55:00Z
8
value 0.05506
scoring_system epss
scoring_elements 0.9024
published_at 2026-04-12T12:55:00Z
9
value 0.05506
scoring_system epss
scoring_elements 0.90234
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5602
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5602
6
reference_url https://www.exploit-db.com/exploits/37710/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/37710/
7
reference_url http://www.debian.org/security/2016/dsa-3440
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3440
8
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
9
reference_url http://www.securitytracker.com/id/1034392
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034392
10
reference_url http://www.sudo.ws/stable.html#1.8.15
reference_id
reference_type
scores
url http://www.sudo.ws/stable.html#1.8.15
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1277426
reference_id 1277426
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1277426
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804149
reference_id 804149
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804149
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5602
reference_id CVE-2015-5602
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-5602
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37710.txt
reference_id CVE-2015-5602;OSVDB-125548
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37710.txt
16
reference_url https://security.gentoo.org/glsa/201606-13
reference_id GLSA-201606-13
reference_type
scores
url https://security.gentoo.org/glsa/201606-13
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
1
url pkg:deb/debian/sudo@1.8.10p3-1%2Bdeb8u5
purl pkg:deb/debian/sudo@1.8.10p3-1%2Bdeb8u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.10p3-1%252Bdeb8u5
2
url pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
purl pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-9y5c-e765-tqgt
5
vulnerability VCID-enw3-mnnx-myd5
6
vulnerability VCID-esf1-4zw7-5fcy
7
vulnerability VCID-ethj-8jmj-5fdh
8
vulnerability VCID-k42r-mk4h-mbbg
9
vulnerability VCID-ngg5-bqw7-bbc4
10
vulnerability VCID-p5yv-48ry-dfe7
11
vulnerability VCID-pj45-2vrx-6fcv
12
vulnerability VCID-pyfy-88dw-9ba8
13
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2
aliases CVE-2015-5602
risk_score 10.0
exploitability 2.0
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9a7y-2e2u-ebbf
12
url VCID-9fh6-mr57-wba8
vulnerability_id VCID-9fh6-mr57-wba8
summary sudo: Improper handling of ipa_hostname leads to privilege mismanagement
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7090.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7090.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-7090
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24216
published_at 2026-04-02T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.24252
published_at 2026-04-04T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.24037
published_at 2026-04-07T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.24105
published_at 2026-04-08T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24151
published_at 2026-04-09T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.24169
published_at 2026-04-11T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.24127
published_at 2026-04-12T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.2407
published_at 2026-04-18T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24083
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-7090
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7090
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2255723
reference_id 2255723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2255723
fixed_packages
0
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2023-7090
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fh6-mr57-wba8
13
url VCID-9whc-9uum-sbfq
vulnerability_id VCID-9whc-9uum-sbfq
summary
Two vulnerabilities have been discovered in sudo, allowing local
    attackers to possibly gain escalated privileges.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
4
reference_url http://openwall.com/lists/oss-security/2011/01/11/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/11/3
5
reference_url http://openwall.com/lists/oss-security/2011/01/12/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/12/1
6
reference_url http://openwall.com/lists/oss-security/2011/01/12/3
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2011/01/12/3
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0010.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0010.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0010
reference_id
reference_type
scores
0
value 0.00112
scoring_system epss
scoring_elements 0.29675
published_at 2026-04-16T12:55:00Z
1
value 0.00112
scoring_system epss
scoring_elements 0.29745
published_at 2026-04-01T12:55:00Z
2
value 0.00112
scoring_system epss
scoring_elements 0.29792
published_at 2026-04-02T12:55:00Z
3
value 0.00112
scoring_system epss
scoring_elements 0.29838
published_at 2026-04-04T12:55:00Z
4
value 0.00112
scoring_system epss
scoring_elements 0.29653
published_at 2026-04-18T12:55:00Z
5
value 0.00112
scoring_system epss
scoring_elements 0.29715
published_at 2026-04-08T12:55:00Z
6
value 0.00112
scoring_system epss
scoring_elements 0.29751
published_at 2026-04-09T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29754
published_at 2026-04-11T12:55:00Z
8
value 0.00112
scoring_system epss
scoring_elements 0.29708
published_at 2026-04-12T12:55:00Z
9
value 0.00112
scoring_system epss
scoring_elements 0.29657
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0010
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010
10
reference_url http://secunia.com/advisories/42886
reference_id
reference_type
scores
url http://secunia.com/advisories/42886
11
reference_url http://secunia.com/advisories/42949
reference_id
reference_type
scores
url http://secunia.com/advisories/42949
12
reference_url http://secunia.com/advisories/42968
reference_id
reference_type
scores
url http://secunia.com/advisories/42968
13
reference_url http://secunia.com/advisories/43068
reference_id
reference_type
scores
url http://secunia.com/advisories/43068
14
reference_url http://secunia.com/advisories/43282
reference_id
reference_type
scores
url http://secunia.com/advisories/43282
15
reference_url http://security.gentoo.org/glsa/glsa-201203-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201203-06.xml
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64636
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64636
17
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593654
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593654
18
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:018
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:018
19
reference_url http://www.osvdb.org/70400
reference_id
reference_type
scores
url http://www.osvdb.org/70400
20
reference_url http://www.redhat.com/support/errata/RHSA-2011-0599.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0599.html
21
reference_url http://www.securityfocus.com/bid/45774
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/45774
22
reference_url http://www.sudo.ws/repos/sudo/rev/07d1b0ce530e
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/07d1b0ce530e
23
reference_url http://www.sudo.ws/repos/sudo/rev/fe8a94f96542
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/fe8a94f96542
24
reference_url http://www.sudo.ws/sudo/alerts/runas_group_pw.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/runas_group_pw.html
25
reference_url http://www.ubuntu.com/usn/USN-1046-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1046-1
26
reference_url http://www.vupen.com/english/advisories/2011/0089
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0089
27
reference_url http://www.vupen.com/english/advisories/2011/0182
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0182
28
reference_url http://www.vupen.com/english/advisories/2011/0195
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0195
29
reference_url http://www.vupen.com/english/advisories/2011/0199
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0199
30
reference_url http://www.vupen.com/english/advisories/2011/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0212
31
reference_url http://www.vupen.com/english/advisories/2011/0362
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0362
32
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641
reference_id 609641
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668879
reference_id 668879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668879
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0010
reference_id CVE-2011-0010
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2011-0010
51
reference_url https://security.gentoo.org/glsa/201203-06
reference_id GLSA-201203-06
reference_type
scores
url https://security.gentoo.org/glsa/201203-06
52
reference_url https://access.redhat.com/errata/RHSA-2011:0599
reference_id RHSA-2011:0599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0599
53
reference_url https://access.redhat.com/errata/RHSA-2012:0309
reference_id RHSA-2012:0309
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0309
54
reference_url https://usn.ubuntu.com/1046-1/
reference_id USN-1046-1
reference_type
scores
url https://usn.ubuntu.com/1046-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
aliases CVE-2011-0010
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9whc-9uum-sbfq
14
url VCID-9x82-hwuz-kycf
vulnerability_id VCID-9x82-hwuz-kycf
summary
Multiple vulnerabilities have been found in sudo which could result
    in privilege escalation.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1353.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1353.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-1701.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1701.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2776.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2776.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2776
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2274
published_at 2026-04-18T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22664
published_at 2026-04-01T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22838
published_at 2026-04-02T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-04T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22674
published_at 2026-04-07T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22749
published_at 2026-04-08T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22801
published_at 2026-04-09T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22823
published_at 2026-04-11T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22785
published_at 2026-04-12T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22728
published_at 2026-04-13T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22745
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2776
6
reference_url https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://www.debian.org/security/2013/dsa-2642
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2642
11
reference_url http://www.openwall.com/lists/oss-security/2013/02/27/31
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/27/31
12
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
13
reference_url http://www.securityfocus.com/bid/58207
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58207
14
reference_url http://www.securityfocus.com/bid/62741
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/62741
15
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
16
reference_url http://www.sudo.ws/repos/sudo/rev/049a12a5cc14
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/049a12a5cc14
17
reference_url http://www.sudo.ws/repos/sudo/rev/0c0283d1fafa
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/0c0283d1fafa
18
reference_url http://www.sudo.ws/sudo/alerts/tty_tickets.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/tty_tickets.html
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
reference_id 701839
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=949751
reference_id 949751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=949751
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2776
reference_id CVE-2013-2776
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2776
98
reference_url https://security.gentoo.org/glsa/201401-23
reference_id GLSA-201401-23
reference_type
scores
url https://security.gentoo.org/glsa/201401-23
99
reference_url https://access.redhat.com/errata/RHSA-2013:1353
reference_id RHSA-2013:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1353
100
reference_url https://access.redhat.com/errata/RHSA-2013:1701
reference_id RHSA-2013:1701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1701
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
aliases CVE-2013-2776
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9x82-hwuz-kycf
15
url VCID-9y5c-e765-tqgt
vulnerability_id VCID-9y5c-e765-tqgt
summary A vulnerability in sudo allows local users to gain root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000368.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000368
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37526
published_at 2026-04-01T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37657
published_at 2026-04-18T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37628
published_at 2026-04-13T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37675
published_at 2026-04-16T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37708
published_at 2026-04-02T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.37733
published_at 2026-04-04T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37612
published_at 2026-04-07T12:55:00Z
7
value 0.00166
scoring_system epss
scoring_elements 0.37663
published_at 2026-04-08T12:55:00Z
8
value 0.00166
scoring_system epss
scoring_elements 0.37676
published_at 2026-04-09T12:55:00Z
9
value 0.00166
scoring_system epss
scoring_elements 0.37691
published_at 2026-04-11T12:55:00Z
10
value 0.00166
scoring_system epss
scoring_elements 0.37656
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1459152
reference_id 1459152
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1459152
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863897
reference_id 863897
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863897
6
reference_url https://security.gentoo.org/glsa/201710-04
reference_id GLSA-201710-04
reference_type
scores
url https://security.gentoo.org/glsa/201710-04
7
reference_url https://access.redhat.com/errata/RHSA-2017:1574
reference_id RHSA-2017:1574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1574
8
reference_url https://usn.ubuntu.com/3968-1/
reference_id USN-3968-1
reference_type
scores
url https://usn.ubuntu.com/3968-1/
9
reference_url https://usn.ubuntu.com/3968-2/
reference_id USN-3968-2
reference_type
scores
url https://usn.ubuntu.com/3968-2/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
purl pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-enw3-mnnx-myd5
5
vulnerability VCID-esf1-4zw7-5fcy
6
vulnerability VCID-ethj-8jmj-5fdh
7
vulnerability VCID-k42r-mk4h-mbbg
8
vulnerability VCID-ngg5-bqw7-bbc4
9
vulnerability VCID-p5yv-48ry-dfe7
10
vulnerability VCID-pj45-2vrx-6fcv
11
vulnerability VCID-pyfy-88dw-9ba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.27-1%252Bdeb10u3
aliases CVE-2017-1000368
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9y5c-e765-tqgt
16
url VCID-a4dr-ann4-hffe
vulnerability_id VCID-a4dr-ann4-hffe
summary CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4158.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4158
reference_id
reference_type
scores
0
value 0.00826
scoring_system epss
scoring_elements 0.74511
published_at 2026-04-18T12:55:00Z
1
value 0.00826
scoring_system epss
scoring_elements 0.74417
published_at 2026-04-01T12:55:00Z
2
value 0.00826
scoring_system epss
scoring_elements 0.74421
published_at 2026-04-02T12:55:00Z
3
value 0.00826
scoring_system epss
scoring_elements 0.74447
published_at 2026-04-04T12:55:00Z
4
value 0.00826
scoring_system epss
scoring_elements 0.74422
published_at 2026-04-07T12:55:00Z
5
value 0.00826
scoring_system epss
scoring_elements 0.74455
published_at 2026-04-08T12:55:00Z
6
value 0.00826
scoring_system epss
scoring_elements 0.74471
published_at 2026-04-09T12:55:00Z
7
value 0.00826
scoring_system epss
scoring_elements 0.74493
published_at 2026-04-11T12:55:00Z
8
value 0.00826
scoring_system epss
scoring_elements 0.74474
published_at 2026-04-12T12:55:00Z
9
value 0.00826
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-13T12:55:00Z
10
value 0.00826
scoring_system epss
scoring_elements 0.74503
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4158
3
reference_url http://secunia.com/advisories/17534/
reference_id
reference_type
scores
url http://secunia.com/advisories/17534/
4
reference_url http://secunia.com/advisories/18102
reference_id
reference_type
scores
url http://secunia.com/advisories/18102
5
reference_url http://secunia.com/advisories/18156
reference_id
reference_type
scores
url http://secunia.com/advisories/18156
6
reference_url http://secunia.com/advisories/18308
reference_id
reference_type
scores
url http://secunia.com/advisories/18308
7
reference_url http://secunia.com/advisories/18463
reference_id
reference_type
scores
url http://secunia.com/advisories/18463
8
reference_url http://secunia.com/advisories/18549
reference_id
reference_type
scores
url http://secunia.com/advisories/18549
9
reference_url http://secunia.com/advisories/18558
reference_id
reference_type
scores
url http://secunia.com/advisories/18558
10
reference_url http://secunia.com/advisories/21692
reference_id
reference_type
scores
url http://secunia.com/advisories/21692
11
reference_url http://securitytracker.com/alerts/2005/Nov/1015192.html
reference_id
reference_type
scores
url http://securitytracker.com/alerts/2005/Nov/1015192.html
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/23102
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/23102
13
reference_url https://www.ubuntu.com/usn/usn-235-1/
reference_id
reference_type
scores
url https://www.ubuntu.com/usn/usn-235-1/
14
reference_url http://www.debian.org/security/2006/dsa-946
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-946
15
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:234
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:234
16
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
17
reference_url http://www.novell.com/linux/security/advisories/2006_02_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_02_sr.html
18
reference_url http://www.securityfocus.com/bid/15394
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15394
19
reference_url http://www.sudo.ws/sudo/alerts/perl_env.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/perl_env.html
20
reference_url http://www.trustix.org/errata/2006/0002/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0002/
21
reference_url http://www.vupen.com/english/advisories/2005/2386
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2386
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=139478
reference_id 139478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=139478
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342948
reference_id 342948
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342948
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4158
reference_id CVE-2005-4158
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-4158
55
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/26498.txt
reference_id CVE-2005-4158;OSVDB-20764
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/26498.txt
56
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/27056.pl
reference_id CVE-2005-4158;OSVDB-20764
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/27056.pl
57
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/27057.py
reference_id CVE-2005-4158;OSVDB-20764
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/27057.py
58
reference_url https://www.securityfocus.com/bid/15394/info
reference_id CVE-2005-4158;OSVDB-20764
reference_type exploit
scores
url https://www.securityfocus.com/bid/15394/info
59
reference_url https://www.securityfocus.com/bid/16184/info
reference_id CVE-2005-4158;OSVDB-20764
reference_type exploit
scores
url https://www.securityfocus.com/bid/16184/info
60
reference_url https://usn.ubuntu.com/235-1/
reference_id USN-235-1
reference_type
scores
url https://usn.ubuntu.com/235-1/
61
reference_url https://usn.ubuntu.com/235-2/
reference_id USN-235-2
reference_type
scores
url https://usn.ubuntu.com/235-2/
fixed_packages
0
url pkg:deb/debian/sudo@1.6.8p12-4
purl pkg:deb/debian/sudo@1.6.8p12-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-jf9c-5due-6feb
24
vulnerability VCID-k42r-mk4h-mbbg
25
vulnerability VCID-kzje-6t7q-rudw
26
vulnerability VCID-mfty-hg4q-x7hp
27
vulnerability VCID-ngg5-bqw7-bbc4
28
vulnerability VCID-p5yv-48ry-dfe7
29
vulnerability VCID-pj45-2vrx-6fcv
30
vulnerability VCID-pyfy-88dw-9ba8
31
vulnerability VCID-qrfs-x7be-u7dx
32
vulnerability VCID-qs5z-f2ew-n7fv
33
vulnerability VCID-t9g1-j9ej-ufcq
34
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p12-4
aliases CVE-2005-4158
risk_score 8.2
exploitability 2.0
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a4dr-ann4-hffe
17
url VCID-buyq-ggky-qbhh
vulnerability_id VCID-buyq-ggky-qbhh
summary
Two vulnerabilities in sudo might allow local users to escalate privileges
    and execute arbitrary code with root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0426.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0426
reference_id
reference_type
scores
0
value 0.0076
scoring_system epss
scoring_elements 0.73283
published_at 2026-04-01T12:55:00Z
1
value 0.0076
scoring_system epss
scoring_elements 0.73293
published_at 2026-04-02T12:55:00Z
2
value 0.0076
scoring_system epss
scoring_elements 0.73317
published_at 2026-04-04T12:55:00Z
3
value 0.0076
scoring_system epss
scoring_elements 0.73288
published_at 2026-04-07T12:55:00Z
4
value 0.0076
scoring_system epss
scoring_elements 0.73324
published_at 2026-04-08T12:55:00Z
5
value 0.0076
scoring_system epss
scoring_elements 0.73337
published_at 2026-04-09T12:55:00Z
6
value 0.0076
scoring_system epss
scoring_elements 0.73361
published_at 2026-04-11T12:55:00Z
7
value 0.0076
scoring_system epss
scoring_elements 0.73341
published_at 2026-04-12T12:55:00Z
8
value 0.0076
scoring_system epss
scoring_elements 0.73333
published_at 2026-04-13T12:55:00Z
9
value 0.0076
scoring_system epss
scoring_elements 0.73376
published_at 2026-04-16T12:55:00Z
10
value 0.0076
scoring_system epss
scoring_elements 0.73384
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=567337
reference_id 567337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=567337
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737
reference_id 570737
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737
5
reference_url https://security.gentoo.org/glsa/201003-01
reference_id GLSA-201003-01
reference_type
scores
url https://security.gentoo.org/glsa/201003-01
6
reference_url https://access.redhat.com/errata/RHSA-2010:0122
reference_id RHSA-2010:0122
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0122
7
reference_url https://usn.ubuntu.com/905-1/
reference_id USN-905-1
reference_type
scores
url https://usn.ubuntu.com/905-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
aliases CVE-2010-0426
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-buyq-ggky-qbhh
18
url VCID-cc9y-weez-hkhu
vulnerability_id VCID-cc9y-weez-hkhu
summary security flaw
references
0
reference_url http://docs.info.apple.com/article.html?artnum=302847
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=302847
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1993.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1993.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1993
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21406
published_at 2026-04-18T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21368
published_at 2026-04-01T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21535
published_at 2026-04-02T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21593
published_at 2026-04-04T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21349
published_at 2026-04-07T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21427
published_at 2026-04-08T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21487
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21498
published_at 2026-04-11T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21459
published_at 2026-04-12T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21404
published_at 2026-04-13T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21399
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1993
3
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161116
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161116
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1993
5
reference_url http://secunia.com/advisories/15744
reference_id
reference_type
scores
url http://secunia.com/advisories/15744
6
reference_url http://secunia.com/advisories/17813
reference_id
reference_type
scores
url http://secunia.com/advisories/17813
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/21080
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/21080
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11341
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11341
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1242
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1242
10
reference_url http://www.debian.org/security/2005/dsa-735
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-735
11
reference_url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_36_sudo.html
12
reference_url http://www.osvdb.org/17396
reference_id
reference_type
scores
url http://www.osvdb.org/17396
13
reference_url http://www.redhat.com/support/errata/RHSA-2005-535.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-535.html
14
reference_url http://www.securityfocus.com/archive/1/402741
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/402741
15
reference_url http://www.securityfocus.com/archive/1/425974/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/425974/100/0/threaded
16
reference_url http://www.securityfocus.com/bid/13993
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13993
17
reference_url http://www.securityfocus.com/bid/15647
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15647
18
reference_url http://www.sudo.ws/sudo/alerts/path_race.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/path_race.html
19
reference_url http://www.vupen.com/english/advisories/2005/0821
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/0821
20
reference_url http://www.vupen.com/english/advisories/2005/2659
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2659
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617680
reference_id 1617680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617680
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315115
reference_id 315115
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315115
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1993
reference_id CVE-2005-1993
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1993
53
reference_url https://access.redhat.com/errata/RHSA-2005:535
reference_id RHSA-2005:535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:535
54
reference_url https://usn.ubuntu.com/142-1/
reference_id USN-142-1
reference_type
scores
url https://usn.ubuntu.com/142-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.6.8p12-4
purl pkg:deb/debian/sudo@1.6.8p12-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-jf9c-5due-6feb
24
vulnerability VCID-k42r-mk4h-mbbg
25
vulnerability VCID-kzje-6t7q-rudw
26
vulnerability VCID-mfty-hg4q-x7hp
27
vulnerability VCID-ngg5-bqw7-bbc4
28
vulnerability VCID-p5yv-48ry-dfe7
29
vulnerability VCID-pj45-2vrx-6fcv
30
vulnerability VCID-pyfy-88dw-9ba8
31
vulnerability VCID-qrfs-x7be-u7dx
32
vulnerability VCID-qs5z-f2ew-n7fv
33
vulnerability VCID-t9g1-j9ej-ufcq
34
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p12-4
aliases CVE-2005-1993
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cc9y-weez-hkhu
19
url VCID-e6kf-aksq-ffbe
vulnerability_id VCID-e6kf-aksq-ffbe
summary
Multiple vulnerabilities have been found in sudo which could result
    in privilege escalation.
references
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1701.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1701.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2777.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2777.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2777
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14556
published_at 2026-04-18T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14712
published_at 2026-04-01T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14763
published_at 2026-04-02T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14839
published_at 2026-04-04T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14643
published_at 2026-04-07T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14732
published_at 2026-04-08T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14791
published_at 2026-04-09T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14749
published_at 2026-04-11T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14711
published_at 2026-04-12T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14657
published_at 2026-04-13T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14551
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2777
5
reference_url https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
8
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
9
reference_url http://www.debian.org/security/2013/dsa-2642
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2642
10
reference_url http://www.openwall.com/lists/oss-security/2013/02/27/31
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/27/31
11
reference_url http://www.securityfocus.com/bid/58207
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58207
12
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
13
reference_url http://www.sudo.ws/repos/sudo/rev/2f3225a2a4a4
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/2f3225a2a4a4
14
reference_url http://www.sudo.ws/repos/sudo/rev/bfa23f089bba
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/bfa23f089bba
15
reference_url http://www.sudo.ws/sudo/alerts/tty_tickets.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/tty_tickets.html
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
reference_id 701839
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=949753
reference_id 949753
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=949753
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2777
reference_id CVE-2013-2777
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2777
94
reference_url https://security.gentoo.org/glsa/201401-23
reference_id GLSA-201401-23
reference_type
scores
url https://security.gentoo.org/glsa/201401-23
95
reference_url https://access.redhat.com/errata/RHSA-2013:1701
reference_id RHSA-2013:1701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1701
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
aliases CVE-2013-2777
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6kf-aksq-ffbe
20
url VCID-enw3-mnnx-myd5
vulnerability_id VCID-enw3-mnnx-myd5
summary A vulnerability has been discovered in sudo which could result in root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22809.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22809
reference_id
reference_type
scores
0
value 0.48016
scoring_system epss
scoring_elements 0.97709
published_at 2026-04-07T12:55:00Z
1
value 0.48016
scoring_system epss
scoring_elements 0.97731
published_at 2026-04-18T12:55:00Z
2
value 0.48016
scoring_system epss
scoring_elements 0.97728
published_at 2026-04-16T12:55:00Z
3
value 0.48016
scoring_system epss
scoring_elements 0.97723
published_at 2026-04-13T12:55:00Z
4
value 0.48016
scoring_system epss
scoring_elements 0.97722
published_at 2026-04-12T12:55:00Z
5
value 0.48016
scoring_system epss
scoring_elements 0.97719
published_at 2026-04-11T12:55:00Z
6
value 0.48016
scoring_system epss
scoring_elements 0.97717
published_at 2026-04-09T12:55:00Z
7
value 0.48016
scoring_system epss
scoring_elements 0.97713
published_at 2026-04-08T12:55:00Z
8
value 0.5353
scoring_system epss
scoring_elements 0.97974
published_at 2026-04-04T12:55:00Z
9
value 0.54539
scoring_system epss
scoring_elements 0.98017
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/01/19/1
reference_id 1
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url http://www.openwall.com/lists/oss-security/2023/01/19/1
5
reference_url http://seclists.org/fulldisclosure/2023/Aug/21
reference_id 21
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url http://seclists.org/fulldisclosure/2023/Aug/21
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2161142
reference_id 2161142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2161142
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/
reference_id 2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/
8
reference_url http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html
reference_id Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51217.sh
reference_id CVE-2023-22809
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51217.sh
10
reference_url https://www.debian.org/security/2023/dsa-5321
reference_id dsa-5321
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://www.debian.org/security/2023/dsa-5321
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4YNBTTKTRT2ME3NTSXAPTOKYUE47XHZ/
reference_id G4YNBTTKTRT2ME3NTSXAPTOKYUE47XHZ
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4YNBTTKTRT2ME3NTSXAPTOKYUE47XHZ/
12
reference_url https://security.gentoo.org/glsa/202305-12
reference_id GLSA-202305-12
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://security.gentoo.org/glsa/202305-12
13
reference_url https://support.apple.com/kb/HT213758
reference_id HT213758
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://support.apple.com/kb/HT213758
14
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html
15
reference_url https://security.netapp.com/advisory/ntap-20230127-0015/
reference_id ntap-20230127-0015
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://security.netapp.com/advisory/ntap-20230127-0015/
16
reference_url https://access.redhat.com/errata/RHSA-2023:0280
reference_id RHSA-2023:0280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0280
17
reference_url https://access.redhat.com/errata/RHSA-2023:0281
reference_id RHSA-2023:0281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0281
18
reference_url https://access.redhat.com/errata/RHSA-2023:0282
reference_id RHSA-2023:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0282
19
reference_url https://access.redhat.com/errata/RHSA-2023:0283
reference_id RHSA-2023:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0283
20
reference_url https://access.redhat.com/errata/RHSA-2023:0284
reference_id RHSA-2023:0284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0284
21
reference_url https://access.redhat.com/errata/RHSA-2023:0287
reference_id RHSA-2023:0287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0287
22
reference_url https://access.redhat.com/errata/RHSA-2023:0291
reference_id RHSA-2023:0291
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0291
23
reference_url https://access.redhat.com/errata/RHSA-2023:0292
reference_id RHSA-2023:0292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0292
24
reference_url https://access.redhat.com/errata/RHSA-2023:0293
reference_id RHSA-2023:0293
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0293
25
reference_url https://access.redhat.com/errata/RHSA-2023:0859
reference_id RHSA-2023:0859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0859
26
reference_url https://access.redhat.com/errata/RHSA-2023:3262
reference_id RHSA-2023:3262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3262
27
reference_url https://access.redhat.com/errata/RHSA-2023:3264
reference_id RHSA-2023:3264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3264
28
reference_url https://access.redhat.com/errata/RHSA-2023:3276
reference_id RHSA-2023:3276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3276
29
reference_url http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html
reference_id sudo-1.9.12p1-Privilege-Escalation.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html
30
reference_url https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf
reference_id sudo-CVE-2023-22809.pdf
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf
31
reference_url https://www.sudo.ws/security/advisories/sudoedit_any/
reference_id sudoedit_any
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url https://www.sudo.ws/security/advisories/sudoedit_any/
32
reference_url http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html
reference_id Sudoedit-Extra-Arguments-Privilege-Escalation.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/
url http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html
33
reference_url https://usn.ubuntu.com/5811-1/
reference_id USN-5811-1
reference_type
scores
url https://usn.ubuntu.com/5811-1/
34
reference_url https://usn.ubuntu.com/5811-2/
reference_id USN-5811-2
reference_type
scores
url https://usn.ubuntu.com/5811-2/
35
reference_url https://usn.ubuntu.com/5811-3/
reference_id USN-5811-3
reference_type
scores
url https://usn.ubuntu.com/5811-3/
fixed_packages
0
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2023-22809
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-enw3-mnnx-myd5
21
url VCID-esf1-4zw7-5fcy
vulnerability_id VCID-esf1-4zw7-5fcy
summary sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19232.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19232.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19232
reference_id
reference_type
scores
0
value 0.02868
scoring_system epss
scoring_elements 0.862
published_at 2026-04-01T12:55:00Z
1
value 0.02868
scoring_system epss
scoring_elements 0.8621
published_at 2026-04-02T12:55:00Z
2
value 0.02868
scoring_system epss
scoring_elements 0.86224
published_at 2026-04-07T12:55:00Z
3
value 0.02868
scoring_system epss
scoring_elements 0.86243
published_at 2026-04-08T12:55:00Z
4
value 0.02868
scoring_system epss
scoring_elements 0.86254
published_at 2026-04-09T12:55:00Z
5
value 0.02868
scoring_system epss
scoring_elements 0.86268
published_at 2026-04-11T12:55:00Z
6
value 0.02868
scoring_system epss
scoring_elements 0.86266
published_at 2026-04-12T12:55:00Z
7
value 0.02868
scoring_system epss
scoring_elements 0.86262
published_at 2026-04-13T12:55:00Z
8
value 0.02868
scoring_system epss
scoring_elements 0.86277
published_at 2026-04-16T12:55:00Z
9
value 0.02868
scoring_system epss
scoring_elements 0.86282
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19232
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19232
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1786704
reference_id 1786704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1786704
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947225
reference_id 947225
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947225
6
reference_url https://access.redhat.com/errata/RHSA-2020:1804
reference_id RHSA-2020:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1804
fixed_packages
0
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2019-19232
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esf1-4zw7-5fcy
22
url VCID-ethj-8jmj-5fdh
vulnerability_id VCID-ethj-8jmj-5fdh
summary Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28486.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28486.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28486
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.29098
published_at 2026-04-02T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.333
published_at 2026-04-07T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33344
published_at 2026-04-08T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33378
published_at 2026-04-09T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33381
published_at 2026-04-11T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33339
published_at 2026-04-12T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33316
published_at 2026-04-13T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33356
published_at 2026-04-16T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33332
published_at 2026-04-18T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33462
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28486
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28486
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179272
reference_id 2179272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179272
5
reference_url https://security.gentoo.org/glsa/202309-12
reference_id GLSA-202309-12
reference_type
scores
url https://security.gentoo.org/glsa/202309-12
6
reference_url https://access.redhat.com/errata/RHSA-2024:0811
reference_id RHSA-2024:0811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0811
7
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
8
reference_url https://usn.ubuntu.com/6005-1/
reference_id USN-6005-1
reference_type
scores
url https://usn.ubuntu.com/6005-1/
9
reference_url https://usn.ubuntu.com/6005-2/
reference_id USN-6005-2
reference_type
scores
url https://usn.ubuntu.com/6005-2/
fixed_packages
0
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3
aliases CVE-2023-28486
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ethj-8jmj-5fdh
23
url VCID-fant-y91b-rubf
vulnerability_id VCID-fant-y91b-rubf
summary
The secure path feature and group handling in sudo allow local attackers to
    escalate privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2956.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2956.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2956
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23282
published_at 2026-04-18T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23217
published_at 2026-04-01T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23396
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23436
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23221
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23294
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23344
published_at 2026-04-09T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23365
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23327
published_at 2026-04-12T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.2327
published_at 2026-04-13T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23287
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2956
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956
5
reference_url http://secunia.com/advisories/40508
reference_id
reference_type
scores
url http://secunia.com/advisories/40508
6
reference_url http://secunia.com/advisories/41316
reference_id
reference_type
scores
url http://secunia.com/advisories/41316
7
reference_url http://secunia.com/advisories/42787
reference_id
reference_type
scores
url http://secunia.com/advisories/42787
8
reference_url http://security.gentoo.org/glsa/glsa-201009-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201009-03.xml
9
reference_url http://wiki.rpath.com/Advisories:rPSA-2010-0075
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2010-0075
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:175
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:175
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0675.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0675.html
12
reference_url http://www.securityfocus.com/archive/1/514489/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514489/100/0/threaded
13
reference_url http://www.securityfocus.com/archive/1/515545/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/515545/100/0/threaded
14
reference_url http://www.securityfocus.com/bid/43019
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43019
15
reference_url http://www.securitytracker.com/id?1024392
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024392
16
reference_url http://www.sudo.ws/sudo/alerts/runas_group.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/runas_group.html
17
reference_url http://www.ubuntu.com/usn/USN-983-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-983-1
18
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0001.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0001.html
19
reference_url http://www.vupen.com/english/advisories/2010/2312
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2312
20
reference_url http://www.vupen.com/english/advisories/2010/2318
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2318
21
reference_url http://www.vupen.com/english/advisories/2010/2320
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2320
22
reference_url http://www.vupen.com/english/advisories/2010/2358
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2358
23
reference_url http://www.vupen.com/english/advisories/2011/0025
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0025
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595935
reference_id 595935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595935
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=628628
reference_id 628628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=628628
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2956
reference_id CVE-2010-2956
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-2956
42
reference_url https://security.gentoo.org/glsa/201009-03
reference_id GLSA-201009-03
reference_type
scores
url https://security.gentoo.org/glsa/201009-03
43
reference_url https://access.redhat.com/errata/RHSA-2010:0675
reference_id RHSA-2010:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0675
44
reference_url https://usn.ubuntu.com/983-1/
reference_id USN-983-1
reference_type
scores
url https://usn.ubuntu.com/983-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
aliases CVE-2010-2956
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fant-y91b-rubf
24
url VCID-hac2-bg9e-bfbr
vulnerability_id VCID-hac2-bg9e-bfbr
summary Incomplete blacklist vulnerability in sudo 1.6.8 and earlier allows local users to gain privileges via the (1) SHELLOPTS and (2) PS4 environment variables before executing a bash script on behalf of another user, which are not cleared even though other variables are.
references
0
reference_url http://docs.info.apple.com/article.html?artnum=305214
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=305214
1
reference_url http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2959.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2959.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2959
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32215
published_at 2026-04-18T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.32196
published_at 2026-04-01T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32331
published_at 2026-04-02T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32369
published_at 2026-04-04T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.32193
published_at 2026-04-07T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32242
published_at 2026-04-08T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.3227
published_at 2026-04-09T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32271
published_at 2026-04-11T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32233
published_at 2026-04-12T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32203
published_at 2026-04-13T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32236
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2959
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2959
5
reference_url http://secunia.com/advisories/17318
reference_id
reference_type
scores
url http://secunia.com/advisories/17318
6
reference_url http://secunia.com/advisories/17322
reference_id
reference_type
scores
url http://secunia.com/advisories/17322
7
reference_url http://secunia.com/advisories/17345
reference_id
reference_type
scores
url http://secunia.com/advisories/17345
8
reference_url http://secunia.com/advisories/17390
reference_id
reference_type
scores
url http://secunia.com/advisories/17390
9
reference_url http://secunia.com/advisories/17666
reference_id
reference_type
scores
url http://secunia.com/advisories/17666
10
reference_url http://secunia.com/advisories/18549
reference_id
reference_type
scores
url http://secunia.com/advisories/18549
11
reference_url http://secunia.com/advisories/24479
reference_id
reference_type
scores
url http://secunia.com/advisories/24479
12
reference_url http://www.debian.org/security/2005/dsa-870
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-870
13
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:201
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:201
14
reference_url http://www.novell.com/linux/security/advisories/2006_02_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_02_sr.html
15
reference_url http://www.openpkg.org/security/OpenPKG-SA-2006.002-sudo.html
reference_id
reference_type
scores
url http://www.openpkg.org/security/OpenPKG-SA-2006.002-sudo.html
16
reference_url http://www.securityfocus.com/advisories/9643
reference_id
reference_type
scores
url http://www.securityfocus.com/advisories/9643
17
reference_url http://www.securityfocus.com/bid/15191
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15191
18
reference_url http://www.sudo.ws/bugs/show_bug.cgi?id=182
reference_id
reference_type
scores
url http://www.sudo.ws/bugs/show_bug.cgi?id=182
19
reference_url http://www.us-cert.gov/cas/techalerts/TA07-072A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-072A.html
20
reference_url http://www.vupen.com/english/advisories/2007/0930
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0930
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2959
reference_id CVE-2005-2959
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2959
54
reference_url https://usn.ubuntu.com/213-1/
reference_id USN-213-1
reference_type
scores
url https://usn.ubuntu.com/213-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.6.8p12-4
purl pkg:deb/debian/sudo@1.6.8p12-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-jf9c-5due-6feb
24
vulnerability VCID-k42r-mk4h-mbbg
25
vulnerability VCID-kzje-6t7q-rudw
26
vulnerability VCID-mfty-hg4q-x7hp
27
vulnerability VCID-ngg5-bqw7-bbc4
28
vulnerability VCID-p5yv-48ry-dfe7
29
vulnerability VCID-pj45-2vrx-6fcv
30
vulnerability VCID-pyfy-88dw-9ba8
31
vulnerability VCID-qrfs-x7be-u7dx
32
vulnerability VCID-qs5z-f2ew-n7fv
33
vulnerability VCID-t9g1-j9ej-ufcq
34
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p12-4
aliases CVE-2005-2959
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hac2-bg9e-bfbr
25
url VCID-j63t-xqk3-p3dk
vulnerability_id VCID-j63t-xqk3-p3dk
summary
A vulnerability in sudo could allow a local attacker to read
    arbitrary files or bypass security restrictions.
references
0
reference_url http://openwall.com/lists/oss-security/2014/10/15/24
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/10/15/24
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-1409.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1409.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9680.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9680.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9680
reference_id
reference_type
scores
0
value 0.0041
scoring_system epss
scoring_elements 0.61376
published_at 2026-04-18T12:55:00Z
1
value 0.0041
scoring_system epss
scoring_elements 0.61333
published_at 2026-04-13T12:55:00Z
2
value 0.0041
scoring_system epss
scoring_elements 0.61372
published_at 2026-04-16T12:55:00Z
3
value 0.0041
scoring_system epss
scoring_elements 0.61207
published_at 2026-04-01T12:55:00Z
4
value 0.0041
scoring_system epss
scoring_elements 0.61287
published_at 2026-04-02T12:55:00Z
5
value 0.0041
scoring_system epss
scoring_elements 0.61315
published_at 2026-04-04T12:55:00Z
6
value 0.0041
scoring_system epss
scoring_elements 0.61284
published_at 2026-04-07T12:55:00Z
7
value 0.0041
scoring_system epss
scoring_elements 0.61331
published_at 2026-04-08T12:55:00Z
8
value 0.0041
scoring_system epss
scoring_elements 0.61346
published_at 2026-04-09T12:55:00Z
9
value 0.0041
scoring_system epss
scoring_elements 0.61367
published_at 2026-04-11T12:55:00Z
10
value 0.0041
scoring_system epss
scoring_elements 0.61352
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9680
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url http://www.securitytracker.com/id/1033158
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033158
7
reference_url http://www.sudo.ws/alerts/tz.html
reference_id
reference_type
scores
url http://www.sudo.ws/alerts/tz.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1191144
reference_id 1191144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1191144
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772707
reference_id 772707
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772707
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:p2:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:*:p2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:p2:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9680
reference_id CVE-2014-9680
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-9680
12
reference_url https://security.gentoo.org/glsa/201504-02
reference_id GLSA-201504-02
reference_type
scores
url https://security.gentoo.org/glsa/201504-02
13
reference_url https://access.redhat.com/errata/RHSA-2015:1409
reference_id RHSA-2015:1409
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1409
14
reference_url https://usn.ubuntu.com/2533-1/
reference_id USN-2533-1
reference_type
scores
url https://usn.ubuntu.com/2533-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
1
url pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
purl pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-9y5c-e765-tqgt
5
vulnerability VCID-enw3-mnnx-myd5
6
vulnerability VCID-esf1-4zw7-5fcy
7
vulnerability VCID-ethj-8jmj-5fdh
8
vulnerability VCID-k42r-mk4h-mbbg
9
vulnerability VCID-ngg5-bqw7-bbc4
10
vulnerability VCID-p5yv-48ry-dfe7
11
vulnerability VCID-pj45-2vrx-6fcv
12
vulnerability VCID-pyfy-88dw-9ba8
13
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2
aliases CVE-2014-9680
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j63t-xqk3-p3dk
26
url VCID-j8m8-5uq3-a7a2
vulnerability_id VCID-j8m8-5uq3-a7a2
summary
The secure path feature and group handling in sudo allow local attackers to
    escalate privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042838.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042838.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043012.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043012.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043026.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043026.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1646.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1646.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1646
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23659
published_at 2026-04-18T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23691
published_at 2026-04-01T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23807
published_at 2026-04-02T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23847
published_at 2026-04-04T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23624
published_at 2026-04-07T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23693
published_at 2026-04-08T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23739
published_at 2026-04-09T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-11T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23712
published_at 2026-04-12T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23656
published_at 2026-04-13T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23668
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1646
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646
7
reference_url http://secunia.com/advisories/40002
reference_id
reference_type
scores
url http://secunia.com/advisories/40002
8
reference_url http://secunia.com/advisories/40188
reference_id
reference_type
scores
url http://secunia.com/advisories/40188
9
reference_url http://secunia.com/advisories/40215
reference_id
reference_type
scores
url http://secunia.com/advisories/40215
10
reference_url http://secunia.com/advisories/40508
reference_id
reference_type
scores
url http://secunia.com/advisories/40508
11
reference_url http://secunia.com/advisories/43068
reference_id
reference_type
scores
url http://secunia.com/advisories/43068
12
reference_url http://security.gentoo.org/glsa/glsa-201009-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201009-03.xml
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10580
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10580
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7338
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7338
15
reference_url http://wiki.rpath.com/Advisories:rPSA-2010-0075
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2010-0075
16
reference_url http://www.debian.org/security/2010/dsa-2062
reference_id
reference_type
scores
url http://www.debian.org/security/2010/dsa-2062
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:118
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:118
18
reference_url http://www.osvdb.org/65083
reference_id
reference_type
scores
url http://www.osvdb.org/65083
19
reference_url http://www.redhat.com/support/errata/RHSA-2010-0475.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0475.html
20
reference_url http://www.securityfocus.com/archive/1/514489/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514489/100/0/threaded
21
reference_url http://www.securityfocus.com/bid/40538
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/40538
22
reference_url http://www.securitytracker.com/id?1024101
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024101
23
reference_url http://www.sudo.ws/repos/sudo/rev/3057fde43cf0
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/3057fde43cf0
24
reference_url http://www.sudo.ws/repos/sudo/rev/a09c6812eaec
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/a09c6812eaec
25
reference_url http://www.sudo.ws/sudo/alerts/secure_path.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/secure_path.html
26
reference_url http://www.vupen.com/english/advisories/2010/1452
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1452
27
reference_url http://www.vupen.com/english/advisories/2010/1478
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1478
28
reference_url http://www.vupen.com/english/advisories/2010/1518
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1518
29
reference_url http://www.vupen.com/english/advisories/2010/1519
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1519
30
reference_url http://www.vupen.com/english/advisories/2011/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0212
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585394
reference_id 585394
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585394
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=598154
reference_id 598154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=598154
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p10:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p11:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p6:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p8:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p10:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p11:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p12:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p13:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p14:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p15:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p16:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p17:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p18:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p19:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p2:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p3:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p4:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p5:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p6:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p7:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p8:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p9:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1646
reference_id CVE-2010-1646
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1646
108
reference_url https://security.gentoo.org/glsa/201009-03
reference_id GLSA-201009-03
reference_type
scores
url https://security.gentoo.org/glsa/201009-03
109
reference_url https://access.redhat.com/errata/RHSA-2010:0475
reference_id RHSA-2010:0475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0475
110
reference_url https://usn.ubuntu.com/956-1/
reference_id USN-956-1
reference_type
scores
url https://usn.ubuntu.com/956-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
aliases CVE-2010-1646
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8m8-5uq3-a7a2
27
url VCID-jf9c-5due-6feb
vulnerability_id VCID-jf9c-5due-6feb
summary A vulnerability in sudo may allow for privilege escalation.
references
0
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000060.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000060.html
1
reference_url http://osvdb.org/51736
reference_id
reference_type
scores
url http://osvdb.org/51736
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0034.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0034.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0034
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15103
published_at 2026-04-18T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15094
published_at 2026-04-16T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15266
published_at 2026-04-01T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15303
published_at 2026-04-02T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15372
published_at 2026-04-04T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15176
published_at 2026-04-07T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15264
published_at 2026-04-08T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15315
published_at 2026-04-09T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15285
published_at 2026-04-11T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15246
published_at 2026-04-12T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15181
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0034
4
reference_url https://bugzilla.novell.com/show_bug.cgi?id=468923
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=468923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0034
6
reference_url http://secunia.com/advisories/33753
reference_id
reference_type
scores
url http://secunia.com/advisories/33753
7
reference_url http://secunia.com/advisories/33840
reference_id
reference_type
scores
url http://secunia.com/advisories/33840
8
reference_url http://secunia.com/advisories/33885
reference_id
reference_type
scores
url http://secunia.com/advisories/33885
9
reference_url http://secunia.com/advisories/35766
reference_id
reference_type
scores
url http://secunia.com/advisories/35766
10
reference_url https://issues.rpath.com/browse/RPL-2954
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2954
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10856
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10856
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6462
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6462
13
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0021
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0021
14
reference_url http://www.gratisoft.us/bugzilla/show_bug.cgi?id=327
reference_id
reference_type
scores
url http://www.gratisoft.us/bugzilla/show_bug.cgi?id=327
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:033
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:033
16
reference_url http://www.redhat.com/support/errata/RHSA-2009-0267.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0267.html
17
reference_url http://www.securityfocus.com/archive/1/500546/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/500546/100/0/threaded
18
reference_url http://www.securityfocus.com/archive/1/504849/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/504849/100/0/threaded
19
reference_url http://www.securityfocus.com/bid/33517
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33517
20
reference_url http://www.securitytracker.com/id?1021688
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021688
21
reference_url http://www.sudo.ws/cgi-bin/cvsweb/sudo/parse.c.diff?r1=1.160.2.21&r2=1.160.2.22&f=h
reference_id
reference_type
scores
url http://www.sudo.ws/cgi-bin/cvsweb/sudo/parse.c.diff?r1=1.160.2.21&r2=1.160.2.22&f=h
22
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0009.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0009.html
23
reference_url http://www.vupen.com/english/advisories/2009/1865
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1865
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=481720
reference_id 481720
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=481720
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gratisoft:sudo:1.6.9:p17:*:*:*:*:*:*
reference_id cpe:2.3:a:gratisoft:sudo:1.6.9:p17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gratisoft:sudo:1.6.9:p17:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gratisoft:sudo:1.6.9:p18:*:*:*:*:*:*
reference_id cpe:2.3:a:gratisoft:sudo:1.6.9:p18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gratisoft:sudo:1.6.9:p18:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gratisoft:sudo:1.6.9:p19:*:*:*:*:*:*
reference_id cpe:2.3:a:gratisoft:sudo:1.6.9:p19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gratisoft:sudo:1.6.9:p19:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0034
reference_id CVE-2009-0034
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2009-0034
30
reference_url https://security.gentoo.org/glsa/200902-01
reference_id GLSA-200902-01
reference_type
scores
url https://security.gentoo.org/glsa/200902-01
31
reference_url https://access.redhat.com/errata/RHSA-2009:0267
reference_id RHSA-2009:0267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0267
32
reference_url https://usn.ubuntu.com/722-1/
reference_id USN-722-1
reference_type
scores
url https://usn.ubuntu.com/722-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.6.9p17-3
purl pkg:deb/debian/sudo@1.6.9p17-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-k42r-mk4h-mbbg
24
vulnerability VCID-kzje-6t7q-rudw
25
vulnerability VCID-mfty-hg4q-x7hp
26
vulnerability VCID-ngg5-bqw7-bbc4
27
vulnerability VCID-p5yv-48ry-dfe7
28
vulnerability VCID-pj45-2vrx-6fcv
29
vulnerability VCID-pyfy-88dw-9ba8
30
vulnerability VCID-qs5z-f2ew-n7fv
31
vulnerability VCID-t9g1-j9ej-ufcq
32
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.9p17-3
aliases CVE-2009-0034
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jf9c-5due-6feb
28
url VCID-k42r-mk4h-mbbg
vulnerability_id VCID-k42r-mk4h-mbbg
summary
Multiple vulnerabilities have been found in sudo, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23239.json
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23239.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-23239
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35875
published_at 2026-04-01T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.35971
published_at 2026-04-18T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.35945
published_at 2026-04-13T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.35985
published_at 2026-04-16T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36066
published_at 2026-04-02T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36095
published_at 2026-04-04T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.3593
published_at 2026-04-07T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.35979
published_at 2026-04-08T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36002
published_at 2026-04-09T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36008
published_at 2026-04-11T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.3597
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-23239
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1915052
reference_id 1915052
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1915052
5
reference_url https://security.archlinux.org/ASA-202101-25
reference_id ASA-202101-25
reference_type
scores
url https://security.archlinux.org/ASA-202101-25
6
reference_url https://security.archlinux.org/AVG-1431
reference_id AVG-1431
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1431
7
reference_url https://security.gentoo.org/glsa/202101-33
reference_id GLSA-202101-33
reference_type
scores
url https://security.gentoo.org/glsa/202101-33
8
reference_url https://access.redhat.com/errata/RHSA-2021:1723
reference_id RHSA-2021:1723
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1723
9
reference_url https://usn.ubuntu.com/4705-1/
reference_id USN-4705-1
reference_type
scores
url https://usn.ubuntu.com/4705-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2021-23239
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k42r-mk4h-mbbg
29
url VCID-kzje-6t7q-rudw
vulnerability_id VCID-kzje-6t7q-rudw
summary sudo: noexec bypass via system() and popen()
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2016-2872.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-2872.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7032.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7032.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7032
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14645
published_at 2026-04-01T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14488
published_at 2026-04-18T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14647
published_at 2026-04-12T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14591
published_at 2026-04-13T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14483
published_at 2026-04-16T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14696
published_at 2026-04-02T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.1477
published_at 2026-04-04T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14576
published_at 2026-04-07T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14665
published_at 2026-04-08T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14724
published_at 2026-04-09T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14685
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7032
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.sudo.ws/alerts/noexec_bypass.html
reference_id
reference_type
scores
url https://www.sudo.ws/alerts/noexec_bypass.html
6
reference_url http://www.securityfocus.com/bid/95776
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95776
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1372830
reference_id 1372830
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1372830
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.11:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.12:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.13:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.14:p3:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.14:p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.14:p3:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-7032
reference_id CVE-2016-7032
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-7032
37
reference_url https://access.redhat.com/errata/RHSA-2016:2872
reference_id RHSA-2016:2872
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2872
38
reference_url https://usn.ubuntu.com/3968-3/
reference_id USN-3968-3
reference_type
scores
url https://usn.ubuntu.com/3968-3/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
purl pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-9y5c-e765-tqgt
5
vulnerability VCID-enw3-mnnx-myd5
6
vulnerability VCID-esf1-4zw7-5fcy
7
vulnerability VCID-ethj-8jmj-5fdh
8
vulnerability VCID-k42r-mk4h-mbbg
9
vulnerability VCID-ngg5-bqw7-bbc4
10
vulnerability VCID-p5yv-48ry-dfe7
11
vulnerability VCID-pj45-2vrx-6fcv
12
vulnerability VCID-pyfy-88dw-9ba8
13
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2
aliases CVE-2016-7032
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kzje-6t7q-rudw
30
url VCID-mfty-hg4q-x7hp
vulnerability_id VCID-mfty-hg4q-x7hp
summary
Multiple vulnerabilities have been found in sudo which could result
    in privilege escalation.
references
0
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html
3
reference_url http://osvdb.org/90677
reference_id
reference_type
scores
url http://osvdb.org/90677
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1353.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1353.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1701.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1701.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1775.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1775.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1775
reference_id
reference_type
scores
0
value 0.0813
scoring_system epss
scoring_elements 0.92177
published_at 2026-04-18T12:55:00Z
1
value 0.0813
scoring_system epss
scoring_elements 0.92135
published_at 2026-04-01T12:55:00Z
2
value 0.0813
scoring_system epss
scoring_elements 0.92142
published_at 2026-04-02T12:55:00Z
3
value 0.0813
scoring_system epss
scoring_elements 0.92149
published_at 2026-04-04T12:55:00Z
4
value 0.0813
scoring_system epss
scoring_elements 0.92152
published_at 2026-04-07T12:55:00Z
5
value 0.0813
scoring_system epss
scoring_elements 0.92164
published_at 2026-04-08T12:55:00Z
6
value 0.0813
scoring_system epss
scoring_elements 0.92167
published_at 2026-04-13T12:55:00Z
7
value 0.0813
scoring_system epss
scoring_elements 0.92171
published_at 2026-04-11T12:55:00Z
8
value 0.0813
scoring_system epss
scoring_elements 0.92172
published_at 2026-04-12T12:55:00Z
9
value 0.0813
scoring_system epss
scoring_elements 0.92178
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1775
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
11
reference_url http://www.debian.org/security/2013/dsa-2642
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2642
12
reference_url http://www.openwall.com/lists/oss-security/2013/02/27/22
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/27/22
13
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
14
reference_url http://www.securityfocus.com/bid/58203
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58203
15
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
16
reference_url http://www.sudo.ws/repos/sudo/rev/ddf399e3e306
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/ddf399e3e306
17
reference_url http://www.sudo.ws/repos/sudo/rev/ebd6cc75020f
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/ebd6cc75020f
18
reference_url http://www.sudo.ws/sudo/alerts/epoch_ticket.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/epoch_ticket.html
19
reference_url http://www.ubuntu.com/usn/USN-1754-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1754-1
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701838
reference_id 701838
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701838
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=916363
reference_id 916363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=916363
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1775
reference_id CVE-2013-1775
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1775
103
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27944.rb
reference_id CVE-2013-1775;OSVDB-90677
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27944.rb
104
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27965.py
reference_id CVE-2013-1775;OSVDB-90677
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27965.py
105
reference_url https://security.gentoo.org/glsa/201401-23
reference_id GLSA-201401-23
reference_type
scores
url https://security.gentoo.org/glsa/201401-23
106
reference_url https://access.redhat.com/errata/RHSA-2013:1353
reference_id RHSA-2013:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1353
107
reference_url https://access.redhat.com/errata/RHSA-2013:1701
reference_id RHSA-2013:1701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1701
108
reference_url https://usn.ubuntu.com/1754-1/
reference_id USN-1754-1
reference_type
scores
url https://usn.ubuntu.com/1754-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
aliases CVE-2013-1775
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfty-hg4q-x7hp
31
url VCID-ngg5-bqw7-bbc4
vulnerability_id VCID-ngg5-bqw7-bbc4
summary Multiple vulnerabilities have been discovered in sudo, the worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32462.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32462
reference_id
reference_type
scores
0
value 0.21724
scoring_system epss
scoring_elements 0.95757
published_at 2026-04-18T12:55:00Z
1
value 0.21724
scoring_system epss
scoring_elements 0.95716
published_at 2026-04-02T12:55:00Z
2
value 0.21724
scoring_system epss
scoring_elements 0.95723
published_at 2026-04-04T12:55:00Z
3
value 0.21724
scoring_system epss
scoring_elements 0.95727
published_at 2026-04-07T12:55:00Z
4
value 0.21724
scoring_system epss
scoring_elements 0.95735
published_at 2026-04-08T12:55:00Z
5
value 0.21724
scoring_system epss
scoring_elements 0.95739
published_at 2026-04-09T12:55:00Z
6
value 0.21724
scoring_system epss
scoring_elements 0.95743
published_at 2026-04-11T12:55:00Z
7
value 0.21724
scoring_system epss
scoring_elements 0.95742
published_at 2026-04-12T12:55:00Z
8
value 0.21724
scoring_system epss
scoring_elements 0.95744
published_at 2026-04-13T12:55:00Z
9
value 0.21724
scoring_system epss
scoring_elements 0.95754
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32462
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2025/06/30/2
reference_id 2
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://www.openwall.com/lists/oss-security/2025/06/30/2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374692
reference_id 2374692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374692
6
reference_url https://www.sudo.ws/security/advisories/
reference_id advisories
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://www.sudo.ws/security/advisories/
7
reference_url https://www.sudo.ws/releases/changelog/
reference_id changelog
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://www.sudo.ws/releases/changelog/
8
reference_url https://access.redhat.com/security/cve/cve-2025-32462
reference_id cve-2025-32462
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://access.redhat.com/security/cve/cve-2025-32462
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52354.txt
reference_id CVE-2025-32462
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52354.txt
10
reference_url https://security-tracker.debian.org/tracker/CVE-2025-32462
reference_id CVE-2025-32462
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://security-tracker.debian.org/tracker/CVE-2025-32462
11
reference_url https://explore.alas.aws.amazon.com/CVE-2025-32462.html
reference_id CVE-2025-32462.html
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://explore.alas.aws.amazon.com/CVE-2025-32462.html
12
reference_url https://www.suse.com/security/cve/CVE-2025-32462.html
reference_id CVE-2025-32462.html
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://www.suse.com/security/cve/CVE-2025-32462.html
13
reference_url https://security.gentoo.org/glsa/202507-01
reference_id GLSA-202507-01
reference_type
scores
url https://security.gentoo.org/glsa/202507-01
14
reference_url https://www.sudo.ws/security/advisories/host_any/
reference_id host_any
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://www.sudo.ws/security/advisories/host_any/
15
reference_url https://lists.debian.org/debian-security-announce/2025/msg00118.html
reference_id msg00118.html
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://lists.debian.org/debian-security-announce/2025/msg00118.html
16
reference_url https://access.redhat.com/errata/RHSA-2025:10110
reference_id RHSA-2025:10110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10110
17
reference_url https://access.redhat.com/errata/RHSA-2025:10383
reference_id RHSA-2025:10383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10383
18
reference_url https://access.redhat.com/errata/RHSA-2025:10518
reference_id RHSA-2025:10518
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10518
19
reference_url https://access.redhat.com/errata/RHSA-2025:10520
reference_id RHSA-2025:10520
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10520
20
reference_url https://access.redhat.com/errata/RHSA-2025:10707
reference_id RHSA-2025:10707
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10707
21
reference_url https://access.redhat.com/errata/RHSA-2025:10767
reference_id RHSA-2025:10767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10767
22
reference_url https://access.redhat.com/errata/RHSA-2025:10771
reference_id RHSA-2025:10771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10771
23
reference_url https://access.redhat.com/errata/RHSA-2025:10779
reference_id RHSA-2025:10779
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10779
24
reference_url https://access.redhat.com/errata/RHSA-2025:10781
reference_id RHSA-2025:10781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10781
25
reference_url https://access.redhat.com/errata/RHSA-2025:10835
reference_id RHSA-2025:10835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10835
26
reference_url https://access.redhat.com/errata/RHSA-2025:10836
reference_id RHSA-2025:10836
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10836
27
reference_url https://access.redhat.com/errata/RHSA-2025:10871
reference_id RHSA-2025:10871
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10871
28
reference_url https://access.redhat.com/errata/RHSA-2025:11537
reference_id RHSA-2025:11537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11537
29
reference_url https://access.redhat.com/errata/RHSA-2025:12323
reference_id RHSA-2025:12323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12323
30
reference_url https://access.redhat.com/errata/RHSA-2025:12370
reference_id RHSA-2025:12370
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12370
31
reference_url https://access.redhat.com/errata/RHSA-2025:12437
reference_id RHSA-2025:12437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12437
32
reference_url https://access.redhat.com/errata/RHSA-2025:13289
reference_id RHSA-2025:13289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13289
33
reference_url https://access.redhat.com/errata/RHSA-2025:15672
reference_id RHSA-2025:15672
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15672
34
reference_url https://access.redhat.com/errata/RHSA-2025:9978
reference_id RHSA-2025:9978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9978
35
reference_url https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32462
reference_id show_bug.cgi?id=CVE-2025-32462
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32462
36
reference_url https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/
reference_id sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/
37
reference_url https://ubuntu.com/security/notices/USN-7604-1
reference_id USN-7604-1
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://ubuntu.com/security/notices/USN-7604-1
38
reference_url https://usn.ubuntu.com/7604-1/
reference_id USN-7604-1
reference_type
scores
url https://usn.ubuntu.com/7604-1/
39
reference_url https://usn.ubuntu.com/7604-2/
reference_id USN-7604-2
reference_type
scores
url https://usn.ubuntu.com/7604-2/
40
reference_url https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host
reference_id vulnerability-alert-CVE-2025-32462-sudo-host
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/
url https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host
fixed_packages
0
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3
aliases CVE-2025-32462
risk_score 10.0
exploitability 2.0
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ngg5-bqw7-bbc4
32
url VCID-p5yv-48ry-dfe7
vulnerability_id VCID-p5yv-48ry-dfe7
summary
Multiple vulnerabilities have been found in sudo, the worst of
    which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18634.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18634.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18634
reference_id
reference_type
scores
0
value 0.87468
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-18T12:55:00Z
1
value 0.87468
scoring_system epss
scoring_elements 0.99457
published_at 2026-04-09T12:55:00Z
2
value 0.87468
scoring_system epss
scoring_elements 0.99458
published_at 2026-04-11T12:55:00Z
3
value 0.87468
scoring_system epss
scoring_elements 0.99459
published_at 2026-04-13T12:55:00Z
4
value 0.87468
scoring_system epss
scoring_elements 0.99462
published_at 2026-04-16T12:55:00Z
5
value 0.87468
scoring_system epss
scoring_elements 0.99455
published_at 2026-04-07T12:55:00Z
6
value 0.87468
scoring_system epss
scoring_elements 0.99456
published_at 2026-04-08T12:55:00Z
7
value 0.88561
scoring_system epss
scoring_elements 0.995
published_at 2026-04-04T12:55:00Z
8
value 0.88561
scoring_system epss
scoring_elements 0.99498
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18634
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1796944
reference_id 1796944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1796944
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950371
reference_id 950371
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950371
6
reference_url https://security.archlinux.org/ASA-202002-2
reference_id ASA-202002-2
reference_type
scores
url https://security.archlinux.org/ASA-202002-2
7
reference_url https://security.archlinux.org/AVG-1093
reference_id AVG-1093
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1093
8
reference_url https://github.com/Plazmaz/CVE-2019-18634/blob/b348e738a83fd4180b3ec26ed216535547f3bb8a/self-contained.sh
reference_id CVE-2019-18634
reference_type exploit
scores
url https://github.com/Plazmaz/CVE-2019-18634/blob/b348e738a83fd4180b3ec26ed216535547f3bb8a/self-contained.sh
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/47995.txt
reference_id CVE-2019-18634
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/47995.txt
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/48052.sh
reference_id CVE-2019-18634
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/48052.sh
11
reference_url https://security.gentoo.org/glsa/202003-12
reference_id GLSA-202003-12
reference_type
scores
url https://security.gentoo.org/glsa/202003-12
12
reference_url https://access.redhat.com/errata/RHSA-2020:0487
reference_id RHSA-2020:0487
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0487
13
reference_url https://access.redhat.com/errata/RHSA-2020:0509
reference_id RHSA-2020:0509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0509
14
reference_url https://access.redhat.com/errata/RHSA-2020:0540
reference_id RHSA-2020:0540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0540
15
reference_url https://access.redhat.com/errata/RHSA-2020:0726
reference_id RHSA-2020:0726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0726
16
reference_url https://usn.ubuntu.com/4263-1/
reference_id USN-4263-1
reference_type
scores
url https://usn.ubuntu.com/4263-1/
17
reference_url https://usn.ubuntu.com/4263-2/
reference_id USN-4263-2
reference_type
scores
url https://usn.ubuntu.com/4263-2/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
purl pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-9y5c-e765-tqgt
5
vulnerability VCID-enw3-mnnx-myd5
6
vulnerability VCID-esf1-4zw7-5fcy
7
vulnerability VCID-ethj-8jmj-5fdh
8
vulnerability VCID-k42r-mk4h-mbbg
9
vulnerability VCID-ngg5-bqw7-bbc4
10
vulnerability VCID-p5yv-48ry-dfe7
11
vulnerability VCID-pj45-2vrx-6fcv
12
vulnerability VCID-pyfy-88dw-9ba8
13
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2019-18634
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p5yv-48ry-dfe7
33
url VCID-pj45-2vrx-6fcv
vulnerability_id VCID-pj45-2vrx-6fcv
summary
Multiple vulnerabilities have been found in sudo, the worst of
    which could result in privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html
2
reference_url http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html
3
reference_url https://access.redhat.com/errata/RHBA-2019:3248
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:3248
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14287.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14287.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-14287
reference_id
reference_type
scores
0
value 0.85814
scoring_system epss
scoring_elements 0.99377
published_at 2026-04-01T12:55:00Z
1
value 0.85814
scoring_system epss
scoring_elements 0.99385
published_at 2026-04-18T12:55:00Z
2
value 0.85814
scoring_system epss
scoring_elements 0.99381
published_at 2026-04-07T12:55:00Z
3
value 0.85814
scoring_system epss
scoring_elements 0.99382
published_at 2026-04-09T12:55:00Z
4
value 0.85814
scoring_system epss
scoring_elements 0.99384
published_at 2026-04-13T12:55:00Z
5
value 0.85814
scoring_system epss
scoring_elements 0.99386
published_at 2026-04-16T12:55:00Z
6
value 0.85814
scoring_system epss
scoring_elements 0.99378
published_at 2026-04-02T12:55:00Z
7
value 0.85814
scoring_system epss
scoring_elements 0.99379
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-14287
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00022.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/10/msg00022.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IP7SIOAVLSKJGMTIULX52VQUPTVSC43U/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IP7SIOAVLSKJGMTIULX52VQUPTVSC43U/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPLAM57TPJQGKQMNG6RHFBLACD6K356N/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPLAM57TPJQGKQMNG6RHFBLACD6K356N/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUVAOZBYUHZS56A5FQSCDVGXT7PW7FL2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUVAOZBYUHZS56A5FQSCDVGXT7PW7FL2/
12
reference_url https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287
reference_id
reference_type
scores
url https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287
13
reference_url https://seclists.org/bugtraq/2019/Oct/20
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Oct/20
14
reference_url https://seclists.org/bugtraq/2019/Oct/21
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2019/Oct/21
15
reference_url https://security.netapp.com/advisory/ntap-20191017-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191017-0003/
16
reference_url https://support.f5.com/csp/article/K53746212?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K53746212?utm_source=f5support&amp%3Butm_medium=RSS
17
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us
18
reference_url https://www.debian.org/security/2019/dsa-4543
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4543
19
reference_url https://www.openwall.com/lists/oss-security/2019/10/15/2
reference_id
reference_type
scores
url https://www.openwall.com/lists/oss-security/2019/10/15/2
20
reference_url https://www.sudo.ws/alerts/minus_1_uid.html
reference_id
reference_type
scores
url https://www.sudo.ws/alerts/minus_1_uid.html
21
reference_url http://www.openwall.com/lists/oss-security/2019/10/14/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/10/14/1
22
reference_url http://www.openwall.com/lists/oss-security/2019/10/24/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/10/24/1
23
reference_url http://www.openwall.com/lists/oss-security/2019/10/29/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2019/10/29/3
24
reference_url http://www.openwall.com/lists/oss-security/2021/09/14/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2021/09/14/2
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1760531
reference_id 1760531
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1760531
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942322
reference_id 942322
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942322
27
reference_url https://security.archlinux.org/ASA-201910-9
reference_id ASA-201910-9
reference_type
scores
url https://security.archlinux.org/ASA-201910-9
28
reference_url https://security.archlinux.org/AVG-1047
reference_id AVG-1047
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1047
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:virtualization:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
76
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47502.py
reference_id CVE-2019-14287
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47502.py
77
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-14287
reference_id CVE-2019-14287
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-14287
78
reference_url https://security.gentoo.org/glsa/202003-12
reference_id GLSA-202003-12
reference_type
scores
url https://security.gentoo.org/glsa/202003-12
79
reference_url https://access.redhat.com/errata/RHSA-2019:3197
reference_id RHSA-2019:3197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3197
80
reference_url https://access.redhat.com/errata/RHSA-2019:3204
reference_id RHSA-2019:3204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3204
81
reference_url https://access.redhat.com/errata/RHSA-2019:3205
reference_id RHSA-2019:3205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3205
82
reference_url https://access.redhat.com/errata/RHSA-2019:3209
reference_id RHSA-2019:3209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3209
83
reference_url https://access.redhat.com/errata/RHSA-2019:3219
reference_id RHSA-2019:3219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3219
84
reference_url https://access.redhat.com/errata/RHSA-2019:3278
reference_id RHSA-2019:3278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3278
85
reference_url https://access.redhat.com/errata/RHSA-2019:3694
reference_id RHSA-2019:3694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3694
86
reference_url https://access.redhat.com/errata/RHSA-2019:3754
reference_id RHSA-2019:3754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3754
87
reference_url https://access.redhat.com/errata/RHSA-2019:3755
reference_id RHSA-2019:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3755
88
reference_url https://access.redhat.com/errata/RHSA-2019:3895
reference_id RHSA-2019:3895
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3895
89
reference_url https://access.redhat.com/errata/RHSA-2019:3916
reference_id RHSA-2019:3916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3916
90
reference_url https://access.redhat.com/errata/RHSA-2019:3941
reference_id RHSA-2019:3941
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3941
91
reference_url https://access.redhat.com/errata/RHSA-2019:4191
reference_id RHSA-2019:4191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4191
92
reference_url https://access.redhat.com/errata/RHSA-2020:0388
reference_id RHSA-2020:0388
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0388
93
reference_url https://usn.ubuntu.com/4154-1/
reference_id USN-4154-1
reference_type
scores
url https://usn.ubuntu.com/4154-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
purl pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-9y5c-e765-tqgt
5
vulnerability VCID-enw3-mnnx-myd5
6
vulnerability VCID-esf1-4zw7-5fcy
7
vulnerability VCID-ethj-8jmj-5fdh
8
vulnerability VCID-k42r-mk4h-mbbg
9
vulnerability VCID-ngg5-bqw7-bbc4
10
vulnerability VCID-p5yv-48ry-dfe7
11
vulnerability VCID-pj45-2vrx-6fcv
12
vulnerability VCID-pyfy-88dw-9ba8
13
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2
1
url pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
purl pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-enw3-mnnx-myd5
5
vulnerability VCID-esf1-4zw7-5fcy
6
vulnerability VCID-ethj-8jmj-5fdh
7
vulnerability VCID-k42r-mk4h-mbbg
8
vulnerability VCID-ngg5-bqw7-bbc4
9
vulnerability VCID-p5yv-48ry-dfe7
10
vulnerability VCID-pj45-2vrx-6fcv
11
vulnerability VCID-pyfy-88dw-9ba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.27-1%252Bdeb10u3
2
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2019-14287
risk_score 10.0
exploitability 2.0
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pj45-2vrx-6fcv
34
url VCID-pyfy-88dw-9ba8
vulnerability_id VCID-pyfy-88dw-9ba8
summary sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19234.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19234.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19234
reference_id
reference_type
scores
0
value 0.04075
scoring_system epss
scoring_elements 0.88492
published_at 2026-04-01T12:55:00Z
1
value 0.04075
scoring_system epss
scoring_elements 0.885
published_at 2026-04-02T12:55:00Z
2
value 0.04075
scoring_system epss
scoring_elements 0.88517
published_at 2026-04-04T12:55:00Z
3
value 0.04075
scoring_system epss
scoring_elements 0.8852
published_at 2026-04-07T12:55:00Z
4
value 0.04075
scoring_system epss
scoring_elements 0.88539
published_at 2026-04-08T12:55:00Z
5
value 0.04075
scoring_system epss
scoring_elements 0.88544
published_at 2026-04-09T12:55:00Z
6
value 0.04075
scoring_system epss
scoring_elements 0.88555
published_at 2026-04-11T12:55:00Z
7
value 0.04075
scoring_system epss
scoring_elements 0.88548
published_at 2026-04-12T12:55:00Z
8
value 0.04075
scoring_system epss
scoring_elements 0.88547
published_at 2026-04-13T12:55:00Z
9
value 0.04075
scoring_system epss
scoring_elements 0.88561
published_at 2026-04-16T12:55:00Z
10
value 0.04075
scoring_system epss
scoring_elements 0.88557
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19234
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19234
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19234
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1786708
reference_id 1786708
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1786708
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947225
reference_id 947225
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947225
6
reference_url https://access.redhat.com/errata/RHSA-2020:1804
reference_id RHSA-2020:1804
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1804
fixed_packages
0
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hfe-p6e3-tbe9
1
vulnerability VCID-e9ra-cfnz-m3hg
2
vulnerability VCID-ethj-8jmj-5fdh
3
vulnerability VCID-m9xh-9ac2-eycq
4
vulnerability VCID-ngg5-bqw7-bbc4
5
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1
aliases CVE-2019-19234
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyfy-88dw-9ba8
35
url VCID-qrfs-x7be-u7dx
vulnerability_id VCID-qrfs-x7be-u7dx
summary sudo: does not flush stdin buffer on password timeout
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3067.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3067.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3067
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17793
published_at 2026-04-18T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17855
published_at 2026-04-01T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18017
published_at 2026-04-02T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.18071
published_at 2026-04-04T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17771
published_at 2026-04-07T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17858
published_at 2026-04-08T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17919
published_at 2026-04-09T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17935
published_at 2026-04-11T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.1789
published_at 2026-04-12T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17842
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17783
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3067
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3067
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/43618
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/43618
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=454398
reference_id 454398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=454398
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:opensuse:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:suse:opensuse:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:opensuse:10.3:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3067
reference_id CVE-2008-3067
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-3067
fixed_packages
0
url pkg:deb/debian/sudo@1.6.9p17-3
purl pkg:deb/debian/sudo@1.6.9p17-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-k42r-mk4h-mbbg
24
vulnerability VCID-kzje-6t7q-rudw
25
vulnerability VCID-mfty-hg4q-x7hp
26
vulnerability VCID-ngg5-bqw7-bbc4
27
vulnerability VCID-p5yv-48ry-dfe7
28
vulnerability VCID-pj45-2vrx-6fcv
29
vulnerability VCID-pyfy-88dw-9ba8
30
vulnerability VCID-qs5z-f2ew-n7fv
31
vulnerability VCID-t9g1-j9ej-ufcq
32
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.9p17-3
aliases CVE-2008-3067
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qrfs-x7be-u7dx
36
url VCID-qs5z-f2ew-n7fv
vulnerability_id VCID-qs5z-f2ew-n7fv
summary
A flaw in sudo's -e option may allow local attackers to execute arbitrary
    commands.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039986.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039986.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1163.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1163
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13587
published_at 2026-04-18T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13714
published_at 2026-04-01T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13808
published_at 2026-04-02T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13864
published_at 2026-04-04T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13664
published_at 2026-04-07T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13747
published_at 2026-04-08T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13797
published_at 2026-04-09T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13766
published_at 2026-04-11T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13729
published_at 2026-04-12T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.1368
published_at 2026-04-13T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.1359
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1163
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163
5
reference_url http://secunia.com/advisories/39384
reference_id
reference_type
scores
url http://secunia.com/advisories/39384
6
reference_url http://secunia.com/advisories/39399
reference_id
reference_type
scores
url http://secunia.com/advisories/39399
7
reference_url http://secunia.com/advisories/39474
reference_id
reference_type
scores
url http://secunia.com/advisories/39474
8
reference_url http://secunia.com/advisories/39543
reference_id
reference_type
scores
url http://secunia.com/advisories/39543
9
reference_url http://secunia.com/advisories/43068
reference_id
reference_type
scores
url http://secunia.com/advisories/43068
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/57836
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/57836
11
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382
13
reference_url http://wiki.rpath.com/Advisories:rPSA-2010-0075
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2010-0075
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:078
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:078
15
reference_url http://www.osvdb.org/63878
reference_id
reference_type
scores
url http://www.osvdb.org/63878
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0361.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0361.html
17
reference_url http://www.securityfocus.com/archive/1/510827/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510827/100/0/threaded
18
reference_url http://www.securityfocus.com/archive/1/510846/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510846/100/0/threaded
19
reference_url http://www.securityfocus.com/archive/1/510880/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510880/100/0/threaded
20
reference_url http://www.securityfocus.com/archive/1/514489/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514489/100/0/threaded
21
reference_url http://www.securityfocus.com/bid/39468
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/39468
22
reference_url http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html
23
reference_url http://www.ubuntu.com/usn/USN-928-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-928-1
24
reference_url http://www.vupen.com/english/advisories/2010/0881
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0881
25
reference_url http://www.vupen.com/english/advisories/2010/0895
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0895
26
reference_url http://www.vupen.com/english/advisories/2010/0904
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0904
27
reference_url http://www.vupen.com/english/advisories/2010/0949
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0949
28
reference_url http://www.vupen.com/english/advisories/2010/0956
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0956
29
reference_url http://www.vupen.com/english/advisories/2010/1019
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1019
30
reference_url http://www.vupen.com/english/advisories/2011/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0212
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578275
reference_id 578275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578275
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=580441
reference_id 580441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=580441
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1163
reference_id CVE-2010-1163
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1163
55
reference_url https://security.gentoo.org/glsa/201006-09
reference_id GLSA-201006-09
reference_type
scores
url https://security.gentoo.org/glsa/201006-09
56
reference_url https://access.redhat.com/errata/RHSA-2010:0361
reference_id RHSA-2010:0361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0361
fixed_packages
0
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
aliases CVE-2010-1163
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs5z-f2ew-n7fv
37
url VCID-rm1k-u2gs-efbx
vulnerability_id VCID-rm1k-u2gs-efbx
summary CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0151
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31959
published_at 2026-04-18T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.31948
published_at 2026-04-01T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32076
published_at 2026-04-02T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32116
published_at 2026-04-04T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.31938
published_at 2026-04-07T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.31989
published_at 2026-04-08T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32018
published_at 2026-04-09T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32021
published_at 2026-04-11T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.31981
published_at 2026-04-16T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.31947
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0151
3
reference_url http://secunia.com/advisories/18358
reference_id
reference_type
scores
url http://secunia.com/advisories/18358
4
reference_url http://secunia.com/advisories/18363
reference_id
reference_type
scores
url http://secunia.com/advisories/18363
5
reference_url http://secunia.com/advisories/18549
reference_id
reference_type
scores
url http://secunia.com/advisories/18549
6
reference_url http://secunia.com/advisories/18558
reference_id
reference_type
scores
url http://secunia.com/advisories/18558
7
reference_url http://secunia.com/advisories/18906
reference_id
reference_type
scores
url http://secunia.com/advisories/18906
8
reference_url http://secunia.com/advisories/19016
reference_id
reference_type
scores
url http://secunia.com/advisories/19016
9
reference_url http://secunia.com/advisories/21692
reference_id
reference_type
scores
url http://secunia.com/advisories/21692
10
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822
11
reference_url http://www.debian.org/security/2006/dsa-946
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-946
12
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
13
reference_url http://www.novell.com/linux/security/advisories/2006_02_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2006_02_sr.html
14
reference_url http://www.securityfocus.com/bid/16184
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/16184
15
reference_url http://www.trustix.org/errata/2006/0010
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0010
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=139478
reference_id 139478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=139478
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-0151
reference_id CVE-2006-0151
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2006-0151
fixed_packages
0
url pkg:deb/debian/sudo@1.6.8p12-4
purl pkg:deb/debian/sudo@1.6.8p12-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-jf9c-5due-6feb
24
vulnerability VCID-k42r-mk4h-mbbg
25
vulnerability VCID-kzje-6t7q-rudw
26
vulnerability VCID-mfty-hg4q-x7hp
27
vulnerability VCID-ngg5-bqw7-bbc4
28
vulnerability VCID-p5yv-48ry-dfe7
29
vulnerability VCID-pj45-2vrx-6fcv
30
vulnerability VCID-pyfy-88dw-9ba8
31
vulnerability VCID-qrfs-x7be-u7dx
32
vulnerability VCID-qs5z-f2ew-n7fv
33
vulnerability VCID-t9g1-j9ej-ufcq
34
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p12-4
aliases CVE-2006-0151
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rm1k-u2gs-efbx
38
url VCID-t9g1-j9ej-ufcq
vulnerability_id VCID-t9g1-j9ej-ufcq
summary
A vulnerability has been found in sudo which may allow local users
    to gain escalated privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2337.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2337.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2337
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14588
published_at 2026-04-01T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14637
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14708
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14521
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.1461
published_at 2026-04-08T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14667
published_at 2026-04-09T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14626
published_at 2026-04-11T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14589
published_at 2026-04-12T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14528
published_at 2026-04-13T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.1442
published_at 2026-04-16T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14423
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2337
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673766
reference_id 673766
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673766
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=820677
reference_id 820677
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=820677
5
reference_url https://security.gentoo.org/glsa/201207-01
reference_id GLSA-201207-01
reference_type
scores
url https://security.gentoo.org/glsa/201207-01
6
reference_url https://access.redhat.com/errata/RHSA-2012:1081
reference_id RHSA-2012:1081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1081
7
reference_url https://usn.ubuntu.com/1442-1/
reference_id USN-1442-1
reference_type
scores
url https://usn.ubuntu.com/1442-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
aliases CVE-2012-2337
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9g1-j9ej-ufcq
39
url VCID-xg63-xrvm-nkbr
vulnerability_id VCID-xg63-xrvm-nkbr
summary sudoedit (aka sudo -e) in sudo 1.6.8 opens a temporary file with root privileges, which allows local users to read arbitrary files via a symlink attack on the temporary file before quitting sudoedit.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1689
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37787
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37969
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37994
published_at 2026-04-04T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37872
published_at 2026-04-07T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37923
published_at 2026-04-08T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37935
published_at 2026-04-16T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37951
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37915
published_at 2026-04-12T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37889
published_at 2026-04-13T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37914
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1689
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1689
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/470.c
reference_id OSVDB-10023;CVE-2004-1689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/470.c
fixed_packages
0
url pkg:deb/debian/sudo@1.6.8p7-1.4
purl pkg:deb/debian/sudo@1.6.8p7-1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-a4dr-ann4-hffe
16
vulnerability VCID-buyq-ggky-qbhh
17
vulnerability VCID-cc9y-weez-hkhu
18
vulnerability VCID-e6kf-aksq-ffbe
19
vulnerability VCID-enw3-mnnx-myd5
20
vulnerability VCID-esf1-4zw7-5fcy
21
vulnerability VCID-ethj-8jmj-5fdh
22
vulnerability VCID-fant-y91b-rubf
23
vulnerability VCID-hac2-bg9e-bfbr
24
vulnerability VCID-j63t-xqk3-p3dk
25
vulnerability VCID-j8m8-5uq3-a7a2
26
vulnerability VCID-jf9c-5due-6feb
27
vulnerability VCID-k42r-mk4h-mbbg
28
vulnerability VCID-kzje-6t7q-rudw
29
vulnerability VCID-mfty-hg4q-x7hp
30
vulnerability VCID-ngg5-bqw7-bbc4
31
vulnerability VCID-p5yv-48ry-dfe7
32
vulnerability VCID-pj45-2vrx-6fcv
33
vulnerability VCID-pyfy-88dw-9ba8
34
vulnerability VCID-qrfs-x7be-u7dx
35
vulnerability VCID-qs5z-f2ew-n7fv
36
vulnerability VCID-rm1k-u2gs-efbx
37
vulnerability VCID-t9g1-j9ej-ufcq
38
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p7-1.4
aliases CVE-2004-1689
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xg63-xrvm-nkbr
40
url VCID-zd6m-f7x1-kkaa
vulnerability_id VCID-zd6m-f7x1-kkaa
summary A vulnerability in sudo allows local users to gain root privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000367.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000367
reference_id
reference_type
scores
0
value 0.19435
scoring_system epss
scoring_elements 0.95348
published_at 2026-04-01T12:55:00Z
1
value 0.19435
scoring_system epss
scoring_elements 0.95397
published_at 2026-04-18T12:55:00Z
2
value 0.19435
scoring_system epss
scoring_elements 0.95383
published_at 2026-04-12T12:55:00Z
3
value 0.19435
scoring_system epss
scoring_elements 0.95385
published_at 2026-04-13T12:55:00Z
4
value 0.19435
scoring_system epss
scoring_elements 0.95393
published_at 2026-04-16T12:55:00Z
5
value 0.19435
scoring_system epss
scoring_elements 0.95358
published_at 2026-04-02T12:55:00Z
6
value 0.19435
scoring_system epss
scoring_elements 0.95364
published_at 2026-04-04T12:55:00Z
7
value 0.19435
scoring_system epss
scoring_elements 0.95369
published_at 2026-04-07T12:55:00Z
8
value 0.19435
scoring_system epss
scoring_elements 0.95376
published_at 2026-04-08T12:55:00Z
9
value 0.19435
scoring_system epss
scoring_elements 0.95378
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1453074
reference_id 1453074
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1453074
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863731
reference_id 863731
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863731
6
reference_url https://security.archlinux.org/ASA-201705-25
reference_id ASA-201705-25
reference_type
scores
url https://security.archlinux.org/ASA-201705-25
7
reference_url https://security.archlinux.org/AVG-282
reference_id AVG-282
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-282
8
reference_url http://seclists.org/oss-sec/2017/q2/470
reference_id CVE-2017-1000367
reference_type exploit
scores
url http://seclists.org/oss-sec/2017/q2/470
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42183.c
reference_id CVE-2017-1000367
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42183.c
10
reference_url https://security.gentoo.org/glsa/201705-15
reference_id GLSA-201705-15
reference_type
scores
url https://security.gentoo.org/glsa/201705-15
11
reference_url https://access.redhat.com/errata/RHSA-2017:1381
reference_id RHSA-2017:1381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1381
12
reference_url https://access.redhat.com/errata/RHSA-2017:1382
reference_id RHSA-2017:1382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1382
13
reference_url https://usn.ubuntu.com/3304-1/
reference_id USN-3304-1
reference_type
scores
url https://usn.ubuntu.com/3304-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.8.10p3-1%2Bdeb8u5
purl pkg:deb/debian/sudo@1.8.10p3-1%2Bdeb8u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.10p3-1%252Bdeb8u5
1
url pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
purl pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-7w9w-4whw-9bgk
3
vulnerability VCID-9fh6-mr57-wba8
4
vulnerability VCID-enw3-mnnx-myd5
5
vulnerability VCID-esf1-4zw7-5fcy
6
vulnerability VCID-ethj-8jmj-5fdh
7
vulnerability VCID-k42r-mk4h-mbbg
8
vulnerability VCID-ngg5-bqw7-bbc4
9
vulnerability VCID-p5yv-48ry-dfe7
10
vulnerability VCID-pj45-2vrx-6fcv
11
vulnerability VCID-pyfy-88dw-9ba8
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.27-1%252Bdeb10u3
aliases CVE-2017-1000367
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zd6m-f7x1-kkaa
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.6p2-2