Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-mfty-hg4q-x7hp
Summary
Multiple vulnerabilities have been found in sudo which could result
    in privilege escalation.
Aliases
0
alias CVE-2013-1775
Fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu1?distro=trixie
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu1%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
2
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
6
url pkg:ebuild/app-admin/sudo@1.8.6_p7
purl pkg:ebuild/app-admin/sudo@1.8.6_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/sudo@1.8.6_p7
Affected_packages
0
url pkg:deb/debian/sudo@1.5.4-4
purl pkg:deb/debian/sudo@1.5.4-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.4-4
1
url pkg:deb/debian/sudo@1.5.6p2-2
purl pkg:deb/debian/sudo@1.5.6p2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.6p2-2
2
url pkg:deb/debian/sudo@1.6.2p2-2.2
purl pkg:deb/debian/sudo@1.6.2p2-2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.2p2-2.2
3
url pkg:deb/debian/sudo@1.6.6-1.3
purl pkg:deb/debian/sudo@1.6.6-1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.6-1.3
4
url pkg:deb/debian/sudo@1.6.8p7-1.4
purl pkg:deb/debian/sudo@1.6.8p7-1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-a4dr-ann4-hffe
16
vulnerability VCID-buyq-ggky-qbhh
17
vulnerability VCID-cc9y-weez-hkhu
18
vulnerability VCID-e6kf-aksq-ffbe
19
vulnerability VCID-enw3-mnnx-myd5
20
vulnerability VCID-esf1-4zw7-5fcy
21
vulnerability VCID-ethj-8jmj-5fdh
22
vulnerability VCID-fant-y91b-rubf
23
vulnerability VCID-hac2-bg9e-bfbr
24
vulnerability VCID-j63t-xqk3-p3dk
25
vulnerability VCID-j8m8-5uq3-a7a2
26
vulnerability VCID-jf9c-5due-6feb
27
vulnerability VCID-k42r-mk4h-mbbg
28
vulnerability VCID-kzje-6t7q-rudw
29
vulnerability VCID-mfty-hg4q-x7hp
30
vulnerability VCID-ngg5-bqw7-bbc4
31
vulnerability VCID-p5yv-48ry-dfe7
32
vulnerability VCID-pj45-2vrx-6fcv
33
vulnerability VCID-pyfy-88dw-9ba8
34
vulnerability VCID-qrfs-x7be-u7dx
35
vulnerability VCID-qs5z-f2ew-n7fv
36
vulnerability VCID-rm1k-u2gs-efbx
37
vulnerability VCID-t9g1-j9ej-ufcq
38
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p7-1.4
5
url pkg:deb/debian/sudo@1.6.8p12-4
purl pkg:deb/debian/sudo@1.6.8p12-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-jf9c-5due-6feb
24
vulnerability VCID-k42r-mk4h-mbbg
25
vulnerability VCID-kzje-6t7q-rudw
26
vulnerability VCID-mfty-hg4q-x7hp
27
vulnerability VCID-ngg5-bqw7-bbc4
28
vulnerability VCID-p5yv-48ry-dfe7
29
vulnerability VCID-pj45-2vrx-6fcv
30
vulnerability VCID-pyfy-88dw-9ba8
31
vulnerability VCID-qrfs-x7be-u7dx
32
vulnerability VCID-qs5z-f2ew-n7fv
33
vulnerability VCID-t9g1-j9ej-ufcq
34
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p12-4
6
url pkg:deb/debian/sudo@1.6.9p17-3
purl pkg:deb/debian/sudo@1.6.9p17-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-k42r-mk4h-mbbg
24
vulnerability VCID-kzje-6t7q-rudw
25
vulnerability VCID-mfty-hg4q-x7hp
26
vulnerability VCID-ngg5-bqw7-bbc4
27
vulnerability VCID-p5yv-48ry-dfe7
28
vulnerability VCID-pj45-2vrx-6fcv
29
vulnerability VCID-pyfy-88dw-9ba8
30
vulnerability VCID-qs5z-f2ew-n7fv
31
vulnerability VCID-t9g1-j9ej-ufcq
32
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.9p17-3
7
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
8
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.6
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.6
9
url pkg:rpm/redhat/sudo@1.7.2p1-28?arch=el5
purl pkg:rpm/redhat/sudo@1.7.2p1-28?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h2a-syy6-67bn
1
vulnerability VCID-9x82-hwuz-kycf
2
vulnerability VCID-mfty-hg4q-x7hp
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sudo@1.7.2p1-28%3Farch=el5
10
url pkg:rpm/redhat/sudo@1.8.6p3-12?arch=el6
purl pkg:rpm/redhat/sudo@1.8.6p3-12?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x82-hwuz-kycf
1
vulnerability VCID-e6kf-aksq-ffbe
2
vulnerability VCID-mfty-hg4q-x7hp
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sudo@1.8.6p3-12%3Farch=el6
References
0
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html
3
reference_url http://osvdb.org/90677
reference_id
reference_type
scores
url http://osvdb.org/90677
4
reference_url http://rhn.redhat.com/errata/RHSA-2013-1353.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1353.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2013-1701.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1701.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1775.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1775.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1775
reference_id
reference_type
scores
0
value 0.0813
scoring_system epss
scoring_elements 0.92177
published_at 2026-04-18T12:55:00Z
1
value 0.0813
scoring_system epss
scoring_elements 0.92135
published_at 2026-04-01T12:55:00Z
2
value 0.0813
scoring_system epss
scoring_elements 0.92142
published_at 2026-04-02T12:55:00Z
3
value 0.0813
scoring_system epss
scoring_elements 0.92149
published_at 2026-04-04T12:55:00Z
4
value 0.0813
scoring_system epss
scoring_elements 0.92152
published_at 2026-04-07T12:55:00Z
5
value 0.0813
scoring_system epss
scoring_elements 0.92164
published_at 2026-04-08T12:55:00Z
6
value 0.0813
scoring_system epss
scoring_elements 0.92167
published_at 2026-04-13T12:55:00Z
7
value 0.0813
scoring_system epss
scoring_elements 0.92171
published_at 2026-04-11T12:55:00Z
8
value 0.0813
scoring_system epss
scoring_elements 0.92172
published_at 2026-04-12T12:55:00Z
9
value 0.0813
scoring_system epss
scoring_elements 0.92178
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1775
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
11
reference_url http://www.debian.org/security/2013/dsa-2642
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2642
12
reference_url http://www.openwall.com/lists/oss-security/2013/02/27/22
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/27/22
13
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
14
reference_url http://www.securityfocus.com/bid/58203
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58203
15
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
16
reference_url http://www.sudo.ws/repos/sudo/rev/ddf399e3e306
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/ddf399e3e306
17
reference_url http://www.sudo.ws/repos/sudo/rev/ebd6cc75020f
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/ebd6cc75020f
18
reference_url http://www.sudo.ws/sudo/alerts/epoch_ticket.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/epoch_ticket.html
19
reference_url http://www.ubuntu.com/usn/USN-1754-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1754-1
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701838
reference_id 701838
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701838
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=916363
reference_id 916363
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=916363
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1775
reference_id CVE-2013-1775
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2013-1775
103
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27944.rb
reference_id CVE-2013-1775;OSVDB-90677
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27944.rb
104
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27965.py
reference_id CVE-2013-1775;OSVDB-90677
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27965.py
105
reference_url https://security.gentoo.org/glsa/201401-23
reference_id GLSA-201401-23
reference_type
scores
url https://security.gentoo.org/glsa/201401-23
106
reference_url https://access.redhat.com/errata/RHSA-2013:1353
reference_id RHSA-2013:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1353
107
reference_url https://access.redhat.com/errata/RHSA-2013:1701
reference_id RHSA-2013:1701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1701
108
reference_url https://usn.ubuntu.com/1754-1/
reference_id USN-1754-1
reference_type
scores
url https://usn.ubuntu.com/1754-1/
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
0
date_added 2013-08-30
description Apple Mac OSX 10.8.4 - Local Privilege Escalation
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2013-08-30
exploit_type local
platform osx
source_date_updated 2013-08-30
data_source Exploit-DB
source_url
1
date_added null
description
This module gains a session with root permissions on versions of OS X with
          sudo binary vulnerable to CVE-2013-1775. Tested working on Mac OS 10.7-10.8.4,
          and possibly lower versions.

          If your session belongs to a user with Administrative Privileges
          (the user is in the sudoers file and is in the "admin group"), and the
          user has ever run the "sudo" command, it is possible to become the super
          user by running `sudo -k` and then resetting the system clock to 01-01-1970.

          This module will fail silently if the user is not an admin, if the user has never
          run the sudo command, or if the admin has locked the Date/Time preferences.

          Note: If the user has locked the Date/Time preferences, requests to overwrite
          the system clock will be ignored, and the module will silently fail. However,
          if the "Require an administrator password to access locked preferences" setting
          is not enabled, the Date/Time preferences are often unlocked every time the admin
          logs in, so you can install persistence and wait for a chance later.
required_action null
due_date null
notes
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
known_ransomware_campaign_use false
source_date_published 2013-02-28
exploit_type null
platform OSX,Unix
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/osx/local/sudo_password_bypass.rb
Severity_range_score6.9 - 6.9
Exploitability2.0
Weighted_severity6.2
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-mfty-hg4q-x7hp