Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/sudo@0?distro=trixie
Typedeb
Namespacedebian
Namesudo
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.6.8p3-1
Latest_non_vulnerable_version1.9.17p2-5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1h8m-m8kr-ruc6
vulnerability_id VCID-1h8m-m8kr-ruc6
summary Sudo 1.6.8p7 on SuSE Linux 9.3, and possibly other Linux distributions, allows local users to gain privileges by using sudo to call su, then entering a blank password and hitting CTRL-C. NOTE: SuSE and multiple third-party researchers have not been able to replicate this issue, stating "Sudo catches SIGINT and returns an empty string for the password so I don't see how this could happen unless the user's actual password was empty.
references
0
reference_url http://archives.neohapsis.com/archives/bugtraq/2005-05/0349.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-15T19:19:25Z/
url http://archives.neohapsis.com/archives/bugtraq/2005-05/0349.html
1
reference_url http://archives.neohapsis.com/archives/bugtraq/2005-05/0359.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-15T19:19:25Z/
url http://archives.neohapsis.com/archives/bugtraq/2005-05/0359.html
2
reference_url http://marc.info/?l=bugtraq&m=111755694008928&w=2
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-15T19:19:25Z/
url http://marc.info/?l=bugtraq&m=111755694008928&w=2
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1831
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.48211
published_at 2026-04-04T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48163
published_at 2026-04-07T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48216
published_at 2026-04-08T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.4821
published_at 2026-04-09T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48234
published_at 2026-04-11T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.4822
published_at 2026-04-13T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.48209
published_at 2026-04-12T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48222
published_at 2026-04-21T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48154
published_at 2026-04-01T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48191
published_at 2026-04-02T12:55:00Z
10
value 0.0025
scoring_system epss
scoring_elements 0.48266
published_at 2026-04-18T12:55:00Z
11
value 0.0025
scoring_system epss
scoring_elements 0.48272
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1831
4
reference_url http://www.osvdb.org/20417
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-15T19:19:25Z/
url http://www.osvdb.org/20417
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1831
reference_id CVE-2005-1831
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2005-1831
fixed_packages
0
url pkg:deb/debian/sudo@0?distro=trixie
purl pkg:deb/debian/sudo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@0%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2005-1831
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1h8m-m8kr-ruc6
1
url VCID-23ny-6yp8-ffan
vulnerability_id VCID-23ny-6yp8-ffan
summary Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27320.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27320
reference_id
reference_type
scores
0
value 0.00211
scoring_system epss
scoring_elements 0.43564
published_at 2026-04-02T12:55:00Z
1
value 0.00211
scoring_system epss
scoring_elements 0.4355
published_at 2026-04-21T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.43591
published_at 2026-04-04T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.43528
published_at 2026-04-07T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.43578
published_at 2026-04-08T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.43593
published_at 2026-04-09T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.43612
published_at 2026-04-11T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43581
published_at 2026-04-12T12:55:00Z
8
value 0.00211
scoring_system epss
scoring_elements 0.43565
published_at 2026-04-13T12:55:00Z
9
value 0.00211
scoring_system epss
scoring_elements 0.43626
published_at 2026-04-16T12:55:00Z
10
value 0.00211
scoring_system epss
scoring_elements 0.43615
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27320
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.openwall.com/lists/oss-security/2023/02/28/1
reference_id 1
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T20:49:04Z/
url https://www.openwall.com/lists/oss-security/2023/02/28/1
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032163
reference_id 1032163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032163
5
reference_url https://www.sudo.ws/releases/stable/#1.9.13p2
reference_id #1.9.13p2
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T20:49:04Z/
url https://www.sudo.ws/releases/stable/#1.9.13p2
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2174218
reference_id 2174218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2174218
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/332KN4QI6QXB7NI7SWSJ2EQJKWIILFN6/
reference_id 332KN4QI6QXB7NI7SWSJ2EQJKWIILFN6
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T20:49:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/332KN4QI6QXB7NI7SWSJ2EQJKWIILFN6/
8
reference_url http://www.openwall.com/lists/oss-security/2023/03/01/8
reference_id 8
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T20:49:04Z/
url http://www.openwall.com/lists/oss-security/2023/03/01/8
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLXMRAMXC3BYL4DNKVTK3V6JDMUXZ7B/
reference_id FPLXMRAMXC3BYL4DNKVTK3V6JDMUXZ7B
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T20:49:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLXMRAMXC3BYL4DNKVTK3V6JDMUXZ7B/
10
reference_url https://security.gentoo.org/glsa/202309-12
reference_id GLSA-202309-12
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T20:49:04Z/
url https://security.gentoo.org/glsa/202309-12
11
reference_url https://security.netapp.com/advisory/ntap-20230413-0009/
reference_id ntap-20230413-0009
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T20:49:04Z/
url https://security.netapp.com/advisory/ntap-20230413-0009/
12
reference_url https://usn.ubuntu.com/5908-1/
reference_id USN-5908-1
reference_type
scores
url https://usn.ubuntu.com/5908-1/
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6VW24YGXJYI4NZ5HZPQCF4MCE7766AU/
reference_id X6VW24YGXJYI4NZ5HZPQCF4MCE7766AU
reference_type
scores
0
value 7.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-21T20:49:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X6VW24YGXJYI4NZ5HZPQCF4MCE7766AU/
fixed_packages
0
url pkg:deb/debian/sudo@0?distro=trixie
purl pkg:deb/debian/sudo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@0%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2023-27320
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23ny-6yp8-ffan
2
url VCID-2tfv-4w12-nbhy
vulnerability_id VCID-2tfv-4w12-nbhy
summary sudo: Possible info leak via INPUTRC
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7091.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7091.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7091
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21256
published_at 2026-04-01T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21412
published_at 2026-04-02T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21466
published_at 2026-04-04T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21218
published_at 2026-04-07T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21298
published_at 2026-04-08T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.2136
published_at 2026-04-09T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21369
published_at 2026-04-11T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.21328
published_at 2026-04-12T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21275
published_at 2026-04-13T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21269
published_at 2026-04-16T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21278
published_at 2026-04-18T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21255
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7091
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1339935
reference_id 1339935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1339935
3
reference_url https://access.redhat.com/errata/RHSA-2016:2593
reference_id RHSA-2016:2593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2593
fixed_packages
0
url pkg:deb/debian/sudo@0?distro=trixie
purl pkg:deb/debian/sudo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@0%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2016-7091
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2tfv-4w12-nbhy
3
url VCID-c6n7-s42u-tqhm
vulnerability_id VCID-c6n7-s42u-tqhm
summary Local authentication bypass in sudo
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3149.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3149.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3149
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.1515
published_at 2026-04-21T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15263
published_at 2026-04-01T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.153
published_at 2026-04-02T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.1537
published_at 2026-04-04T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15173
published_at 2026-04-07T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15262
published_at 2026-04-08T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15312
published_at 2026-04-09T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-11T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15244
published_at 2026-04-12T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15178
published_at 2026-04-13T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15092
published_at 2026-04-16T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.151
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3149
2
reference_url http://secunia.com/advisories/26540
reference_id
reference_type
scores
url http://secunia.com/advisories/26540
3
reference_url http://www.securityfocus.com/archive/1/470739/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/470739/100/0/threaded
4
reference_url http://www.securityfocus.com/archive/1/470752/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/470752/100/0/threaded
5
reference_url http://www.securityfocus.com/archive/1/470774/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/470774/100/0/threaded
6
reference_url http://www.securityfocus.com/bid/24368
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24368
7
reference_url http://www.sudo.ws/cgi-bin/cvsweb/sudo/auth/kerb5.c
reference_id
reference_type
scores
url http://www.sudo.ws/cgi-bin/cvsweb/sudo/auth/kerb5.c
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=243702
reference_id 243702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=243702
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-3149
reference_id CVE-2007-3149
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2007-3149
fixed_packages
0
url pkg:deb/debian/sudo@0?distro=trixie
purl pkg:deb/debian/sudo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@0%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2007-3149
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6n7-s42u-tqhm
4
url VCID-euh3-n21v-8yh3
vulnerability_id VCID-euh3-n21v-8yh3
summary sudo: insecure temporary file use in RPM %postun script
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3440.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3440
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26041
published_at 2026-04-21T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.26198
published_at 2026-04-11T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26153
published_at 2026-04-12T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26094
published_at 2026-04-13T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26099
published_at 2026-04-16T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26076
published_at 2026-04-18T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.2619
published_at 2026-04-09T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31149
published_at 2026-04-02T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31197
published_at 2026-04-04T12:55:00Z
9
value 0.00121
scoring_system epss
scoring_elements 0.31016
published_at 2026-04-07T12:55:00Z
10
value 0.00121
scoring_system epss
scoring_elements 0.31072
published_at 2026-04-08T12:55:00Z
11
value 0.00121
scoring_system epss
scoring_elements 0.31024
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3440
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=844442
reference_id 844442
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=844442
3
reference_url https://access.redhat.com/errata/RHSA-2012:1149
reference_id RHSA-2012:1149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1149
fixed_packages
0
url pkg:deb/debian/sudo@0?distro=trixie
purl pkg:deb/debian/sudo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@0%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2012-3440
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-euh3-n21v-8yh3
5
url VCID-z1h6-sryr-u3ac
vulnerability_id VCID-z1h6-sryr-u3ac
summary sudo in Fedora vulnerable to CVE-2009-0034 again due to improper patch rediff
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0008.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0008.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0008
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14284
published_at 2026-04-21T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14363
published_at 2026-04-01T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14448
published_at 2026-04-02T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14518
published_at 2026-04-04T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14326
published_at 2026-04-07T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14409
published_at 2026-04-08T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14465
published_at 2026-04-09T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14414
published_at 2026-04-11T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.14378
published_at 2026-04-12T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14323
published_at 2026-04-13T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14212
published_at 2026-04-16T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14211
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0008
4
reference_url http://secunia.com/advisories/42968
reference_id
reference_type
scores
url http://secunia.com/advisories/42968
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/64965
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/64965
6
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:018
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:018
7
reference_url http://www.vupen.com/english/advisories/2011/0195
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0195
8
reference_url http://www.vupen.com/english/advisories/2011/0199
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0199
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=668843
reference_id 668843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=668843
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.3:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p10:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p11:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p5:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p6:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p8:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p9:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p10:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p11:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p12:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p13:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p14:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p15:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p16:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p17:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p18:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p19:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p2:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p3:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p4:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p5:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p6:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p7:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p8:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p9:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora:14:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:fedora:14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora:14:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0008
reference_id CVE-2011-0008
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0008
fixed_packages
0
url pkg:deb/debian/sudo@0?distro=trixie
purl pkg:deb/debian/sudo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@0%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2011-0008
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z1h6-sryr-u3ac
6
url VCID-ztsc-935d-dbga
vulnerability_id VCID-ztsc-935d-dbga
summary Multiple vulnerabilities have been discovered in sudo, the worst of which could result in privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32463.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32463
reference_id
reference_type
scores
0
value 0.38489
scoring_system epss
scoring_elements 0.9725
published_at 2026-04-18T12:55:00Z
1
value 0.38489
scoring_system epss
scoring_elements 0.97248
published_at 2026-04-16T12:55:00Z
2
value 0.38489
scoring_system epss
scoring_elements 0.9724
published_at 2026-04-13T12:55:00Z
3
value 0.38489
scoring_system epss
scoring_elements 0.97239
published_at 2026-04-12T12:55:00Z
4
value 0.38489
scoring_system epss
scoring_elements 0.97238
published_at 2026-04-11T12:55:00Z
5
value 0.38489
scoring_system epss
scoring_elements 0.97224
published_at 2026-04-07T12:55:00Z
6
value 0.38489
scoring_system epss
scoring_elements 0.97218
published_at 2026-04-02T12:55:00Z
7
value 0.38489
scoring_system epss
scoring_elements 0.97253
published_at 2026-04-21T12:55:00Z
8
value 0.38489
scoring_system epss
scoring_elements 0.97235
published_at 2026-04-09T12:55:00Z
9
value 0.38489
scoring_system epss
scoring_elements 0.97234
published_at 2026-04-08T12:55:00Z
10
value 0.38489
scoring_system epss
scoring_elements 0.97223
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32463
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2374693
reference_id 2374693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2374693
4
reference_url https://www.openwall.com/lists/oss-security/2025/06/30/3
reference_id 3
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.openwall.com/lists/oss-security/2025/06/30/3
5
reference_url https://www.sudo.ws/security/advisories/
reference_id advisories
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.sudo.ws/security/advisories/
6
reference_url https://www.sudo.ws/releases/changelog/
reference_id changelog
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.sudo.ws/releases/changelog/
7
reference_url https://www.sudo.ws/security/advisories/chroot_bug/
reference_id chroot_bug
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.sudo.ws/security/advisories/chroot_bug/
8
reference_url https://access.redhat.com/security/cve/cve-2025-32463
reference_id cve-2025-32463
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://access.redhat.com/security/cve/cve-2025-32463
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52352.txt
reference_id CVE-2025-32463
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52352.txt
10
reference_url https://security-tracker.debian.org/tracker/CVE-2025-32463
reference_id CVE-2025-32463
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://security-tracker.debian.org/tracker/CVE-2025-32463
11
reference_url https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability
reference_id cve-2025-32463-detect-sudo-vulnerability
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.vicarius.io/vsociety/posts/cve-2025-32463-detect-sudo-vulnerability
12
reference_url https://explore.alas.aws.amazon.com/CVE-2025-32463.html
reference_id CVE-2025-32463.html
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://explore.alas.aws.amazon.com/CVE-2025-32463.html
13
reference_url https://www.suse.com/security/cve/CVE-2025-32463.html
reference_id CVE-2025-32463.html
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.suse.com/security/cve/CVE-2025-32463.html
14
reference_url https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability
reference_id cve-2025-32463-mitigate-sudo-vulnerability
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.vicarius.io/vsociety/posts/cve-2025-32463-mitigate-sudo-vulnerability
15
reference_url https://security.gentoo.org/glsa/202507-01
reference_id GLSA-202507-01
reference_type
scores
url https://security.gentoo.org/glsa/202507-01
16
reference_url https://access.redhat.com/errata/RHSA-2025:11537
reference_id RHSA-2025:11537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11537
17
reference_url https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463
reference_id show_bug.cgi?id=CVE-2025-32463
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32463
18
reference_url https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/
reference_id sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/
19
reference_url https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/
reference_id suse-su-202502177-1
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.suse.com/support/update/announcement/2025/suse-su-202502177-1/
20
reference_url https://ubuntu.com/security/notices/USN-7604-1
reference_id USN-7604-1
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://ubuntu.com/security/notices/USN-7604-1
21
reference_url https://usn.ubuntu.com/7604-1/
reference_id USN-7604-1
reference_type
scores
url https://usn.ubuntu.com/7604-1/
22
reference_url https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
reference_id vulnerability-alert-CVE-2025-32463-sudo-chroot
reference_type
scores
0
value 9.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-09-27T03:55:22Z/
url https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
fixed_packages
0
url pkg:deb/debian/sudo@0?distro=trixie
purl pkg:deb/debian/sudo@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@0%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.16p2-3?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2025-32463
risk_score 10.0
exploitability 2.0
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztsc-935d-dbga
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@0%3Fdistro=trixie