Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/sudo@1.7.4p4-1?distro=trixie
Typedeb
Namespacedebian
Namesudo
Version1.7.4p4-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.7.4p4-6
Latest_non_vulnerable_version1.9.17p2-5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-fant-y91b-rubf
vulnerability_id VCID-fant-y91b-rubf
summary
The secure path feature and group handling in sudo allow local attackers to
    escalate privileges.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2956.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2956.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2956
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23264
published_at 2026-04-21T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23217
published_at 2026-04-01T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23396
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23436
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23221
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23294
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23344
published_at 2026-04-09T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23365
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23327
published_at 2026-04-12T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.2327
published_at 2026-04-13T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23287
published_at 2026-04-16T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23282
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2956
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956
5
reference_url http://secunia.com/advisories/40508
reference_id
reference_type
scores
url http://secunia.com/advisories/40508
6
reference_url http://secunia.com/advisories/41316
reference_id
reference_type
scores
url http://secunia.com/advisories/41316
7
reference_url http://secunia.com/advisories/42787
reference_id
reference_type
scores
url http://secunia.com/advisories/42787
8
reference_url http://security.gentoo.org/glsa/glsa-201009-03.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201009-03.xml
9
reference_url http://wiki.rpath.com/Advisories:rPSA-2010-0075
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2010-0075
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:175
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:175
11
reference_url http://www.redhat.com/support/errata/RHSA-2010-0675.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0675.html
12
reference_url http://www.securityfocus.com/archive/1/514489/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/514489/100/0/threaded
13
reference_url http://www.securityfocus.com/archive/1/515545/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/515545/100/0/threaded
14
reference_url http://www.securityfocus.com/bid/43019
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/43019
15
reference_url http://www.securitytracker.com/id?1024392
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1024392
16
reference_url http://www.sudo.ws/sudo/alerts/runas_group.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/runas_group.html
17
reference_url http://www.ubuntu.com/usn/USN-983-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-983-1
18
reference_url http://www.vmware.com/security/advisories/VMSA-2011-0001.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2011-0001.html
19
reference_url http://www.vupen.com/english/advisories/2010/2312
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2312
20
reference_url http://www.vupen.com/english/advisories/2010/2318
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2318
21
reference_url http://www.vupen.com/english/advisories/2010/2320
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2320
22
reference_url http://www.vupen.com/english/advisories/2010/2358
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2358
23
reference_url http://www.vupen.com/english/advisories/2011/0025
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0025
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595935
reference_id 595935
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=595935
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=628628
reference_id 628628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=628628
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2956
reference_id CVE-2010-2956
reference_type
scores
0
value 6.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2010-2956
42
reference_url https://security.gentoo.org/glsa/201009-03
reference_id GLSA-201009-03
reference_type
scores
url https://security.gentoo.org/glsa/201009-03
43
reference_url https://access.redhat.com/errata/RHSA-2010:0675
reference_id RHSA-2010:0675
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0675
44
reference_url https://usn.ubuntu.com/983-1/
reference_id USN-983-1
reference_type
scores
url https://usn.ubuntu.com/983-1/
fixed_packages
0
url pkg:deb/debian/sudo@1.7.4p4-1?distro=trixie
purl pkg:deb/debian/sudo@1.7.4p4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-1%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
aliases CVE-2010-2956
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fant-y91b-rubf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-1%3Fdistro=trixie