Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/sudo@1.7.2p6-1?distro=trixie
Typedeb
Namespacedebian
Namesudo
Version1.7.2p6-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.7.2p7-1
Latest_non_vulnerable_version1.9.17p2-5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-qs5z-f2ew-n7fv
vulnerability_id VCID-qs5z-f2ew-n7fv
summary
A flaw in sudo's -e option may allow local attackers to execute arbitrary
    commands.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039986.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039986.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1163.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-1163
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.1366
published_at 2026-04-21T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13714
published_at 2026-04-01T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13808
published_at 2026-04-02T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13864
published_at 2026-04-04T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13664
published_at 2026-04-07T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13747
published_at 2026-04-08T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13797
published_at 2026-04-09T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13766
published_at 2026-04-11T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13729
published_at 2026-04-12T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.1368
published_at 2026-04-13T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.1359
published_at 2026-04-16T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13587
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-1163
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163
5
reference_url http://secunia.com/advisories/39384
reference_id
reference_type
scores
url http://secunia.com/advisories/39384
6
reference_url http://secunia.com/advisories/39399
reference_id
reference_type
scores
url http://secunia.com/advisories/39399
7
reference_url http://secunia.com/advisories/39474
reference_id
reference_type
scores
url http://secunia.com/advisories/39474
8
reference_url http://secunia.com/advisories/39543
reference_id
reference_type
scores
url http://secunia.com/advisories/39543
9
reference_url http://secunia.com/advisories/43068
reference_id
reference_type
scores
url http://secunia.com/advisories/43068
10
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/57836
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/57836
11
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382
13
reference_url http://wiki.rpath.com/Advisories:rPSA-2010-0075
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2010-0075
14
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:078
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:078
15
reference_url http://www.osvdb.org/63878
reference_id
reference_type
scores
url http://www.osvdb.org/63878
16
reference_url http://www.redhat.com/support/errata/RHSA-2010-0361.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0361.html
17
reference_url http://www.securityfocus.com/archive/1/510827/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510827/100/0/threaded
18
reference_url http://www.securityfocus.com/archive/1/510846/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510846/100/0/threaded
19
reference_url http://www.securityfocus.com/archive/1/510880/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/510880/100/0/threaded
20
reference_url http://www.securityfocus.com/archive/1/514489/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514489/100/0/threaded
21
reference_url http://www.securityfocus.com/bid/39468
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/39468
22
reference_url http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html
23
reference_url http://www.ubuntu.com/usn/USN-928-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-928-1
24
reference_url http://www.vupen.com/english/advisories/2010/0881
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0881
25
reference_url http://www.vupen.com/english/advisories/2010/0895
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0895
26
reference_url http://www.vupen.com/english/advisories/2010/0904
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0904
27
reference_url http://www.vupen.com/english/advisories/2010/0949
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0949
28
reference_url http://www.vupen.com/english/advisories/2010/0956
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0956
29
reference_url http://www.vupen.com/english/advisories/2010/1019
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1019
30
reference_url http://www.vupen.com/english/advisories/2011/0212
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0212
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578275
reference_id 578275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=578275
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=580441
reference_id 580441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=580441
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-1163
reference_id CVE-2010-1163
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-1163
55
reference_url https://security.gentoo.org/glsa/201006-09
reference_id GLSA-201006-09
reference_type
scores
url https://security.gentoo.org/glsa/201006-09
56
reference_url https://access.redhat.com/errata/RHSA-2010:0361
reference_id RHSA-2010:0361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0361
fixed_packages
0
url pkg:deb/debian/sudo@1.7.2p6-1?distro=trixie
purl pkg:deb/debian/sudo@1.7.2p6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.2p6-1%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2010-1163
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qs5z-f2ew-n7fv
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.2p6-1%3Fdistro=trixie