Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-9x82-hwuz-kycf
Summary
Multiple vulnerabilities have been found in sudo which could result
    in privilege escalation.
Aliases
0
alias CVE-2013-2776
Fixed_packages
0
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu1?distro=trixie
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu1%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
purl pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-3hfe-p6e3-tbe9
2
vulnerability VCID-71wy-ujxu-bbfj
3
vulnerability VCID-7w9w-4whw-9bgk
4
vulnerability VCID-8r7f-bt93-qqcq
5
vulnerability VCID-9a7y-2e2u-ebbf
6
vulnerability VCID-9fh6-mr57-wba8
7
vulnerability VCID-9y5c-e765-tqgt
8
vulnerability VCID-enw3-mnnx-myd5
9
vulnerability VCID-esf1-4zw7-5fcy
10
vulnerability VCID-ethj-8jmj-5fdh
11
vulnerability VCID-j63t-xqk3-p3dk
12
vulnerability VCID-k42r-mk4h-mbbg
13
vulnerability VCID-kzje-6t7q-rudw
14
vulnerability VCID-ngg5-bqw7-bbc4
15
vulnerability VCID-p5yv-48ry-dfe7
16
vulnerability VCID-pj45-2vrx-6fcv
17
vulnerability VCID-pyfy-88dw-9ba8
18
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1
2
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
6
url pkg:ebuild/app-admin/sudo@1.8.6_p7
purl pkg:ebuild/app-admin/sudo@1.8.6_p7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-admin/sudo@1.8.6_p7
Affected_packages
0
url pkg:deb/debian/sudo@1.5.4-4
purl pkg:deb/debian/sudo@1.5.4-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.4-4
1
url pkg:deb/debian/sudo@1.5.6p2-2
purl pkg:deb/debian/sudo@1.5.6p2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.6p2-2
2
url pkg:deb/debian/sudo@1.6.2p2-2.2
purl pkg:deb/debian/sudo@1.6.2p2-2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.2p2-2.2
3
url pkg:deb/debian/sudo@1.6.6-1.3
purl pkg:deb/debian/sudo@1.6.6-1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.6-1.3
4
url pkg:deb/debian/sudo@1.6.8p7-1.4
purl pkg:deb/debian/sudo@1.6.8p7-1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-a4dr-ann4-hffe
16
vulnerability VCID-buyq-ggky-qbhh
17
vulnerability VCID-cc9y-weez-hkhu
18
vulnerability VCID-e6kf-aksq-ffbe
19
vulnerability VCID-enw3-mnnx-myd5
20
vulnerability VCID-esf1-4zw7-5fcy
21
vulnerability VCID-ethj-8jmj-5fdh
22
vulnerability VCID-fant-y91b-rubf
23
vulnerability VCID-hac2-bg9e-bfbr
24
vulnerability VCID-j63t-xqk3-p3dk
25
vulnerability VCID-j8m8-5uq3-a7a2
26
vulnerability VCID-jf9c-5due-6feb
27
vulnerability VCID-k42r-mk4h-mbbg
28
vulnerability VCID-kzje-6t7q-rudw
29
vulnerability VCID-mfty-hg4q-x7hp
30
vulnerability VCID-ngg5-bqw7-bbc4
31
vulnerability VCID-p5yv-48ry-dfe7
32
vulnerability VCID-pj45-2vrx-6fcv
33
vulnerability VCID-pyfy-88dw-9ba8
34
vulnerability VCID-qrfs-x7be-u7dx
35
vulnerability VCID-qs5z-f2ew-n7fv
36
vulnerability VCID-rm1k-u2gs-efbx
37
vulnerability VCID-t9g1-j9ej-ufcq
38
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p7-1.4
5
url pkg:deb/debian/sudo@1.6.8p12-4
purl pkg:deb/debian/sudo@1.6.8p12-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-jf9c-5due-6feb
24
vulnerability VCID-k42r-mk4h-mbbg
25
vulnerability VCID-kzje-6t7q-rudw
26
vulnerability VCID-mfty-hg4q-x7hp
27
vulnerability VCID-ngg5-bqw7-bbc4
28
vulnerability VCID-p5yv-48ry-dfe7
29
vulnerability VCID-pj45-2vrx-6fcv
30
vulnerability VCID-pyfy-88dw-9ba8
31
vulnerability VCID-qrfs-x7be-u7dx
32
vulnerability VCID-qs5z-f2ew-n7fv
33
vulnerability VCID-t9g1-j9ej-ufcq
34
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p12-4
6
url pkg:deb/debian/sudo@1.6.9p17-3
purl pkg:deb/debian/sudo@1.6.9p17-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-buyq-ggky-qbhh
16
vulnerability VCID-e6kf-aksq-ffbe
17
vulnerability VCID-enw3-mnnx-myd5
18
vulnerability VCID-esf1-4zw7-5fcy
19
vulnerability VCID-ethj-8jmj-5fdh
20
vulnerability VCID-fant-y91b-rubf
21
vulnerability VCID-j63t-xqk3-p3dk
22
vulnerability VCID-j8m8-5uq3-a7a2
23
vulnerability VCID-k42r-mk4h-mbbg
24
vulnerability VCID-kzje-6t7q-rudw
25
vulnerability VCID-mfty-hg4q-x7hp
26
vulnerability VCID-ngg5-bqw7-bbc4
27
vulnerability VCID-p5yv-48ry-dfe7
28
vulnerability VCID-pj45-2vrx-6fcv
29
vulnerability VCID-pyfy-88dw-9ba8
30
vulnerability VCID-qs5z-f2ew-n7fv
31
vulnerability VCID-t9g1-j9ej-ufcq
32
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.9p17-3
7
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.4
8
url pkg:deb/debian/sudo@1.7.4p4-2.squeeze.6
purl pkg:deb/debian/sudo@1.7.4p4-2.squeeze.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2jvq-feqm-rueb
2
vulnerability VCID-3hfe-p6e3-tbe9
3
vulnerability VCID-49cf-c1kh-27cf
4
vulnerability VCID-5h2a-syy6-67bn
5
vulnerability VCID-71wy-ujxu-bbfj
6
vulnerability VCID-7w9w-4whw-9bgk
7
vulnerability VCID-8r7f-bt93-qqcq
8
vulnerability VCID-9a7y-2e2u-ebbf
9
vulnerability VCID-9fh6-mr57-wba8
10
vulnerability VCID-9whc-9uum-sbfq
11
vulnerability VCID-9x82-hwuz-kycf
12
vulnerability VCID-9y5c-e765-tqgt
13
vulnerability VCID-e6kf-aksq-ffbe
14
vulnerability VCID-enw3-mnnx-myd5
15
vulnerability VCID-esf1-4zw7-5fcy
16
vulnerability VCID-ethj-8jmj-5fdh
17
vulnerability VCID-j63t-xqk3-p3dk
18
vulnerability VCID-k42r-mk4h-mbbg
19
vulnerability VCID-kzje-6t7q-rudw
20
vulnerability VCID-mfty-hg4q-x7hp
21
vulnerability VCID-ngg5-bqw7-bbc4
22
vulnerability VCID-p5yv-48ry-dfe7
23
vulnerability VCID-pj45-2vrx-6fcv
24
vulnerability VCID-pyfy-88dw-9ba8
25
vulnerability VCID-t9g1-j9ej-ufcq
26
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.6
9
url pkg:rpm/redhat/sudo@1.7.2p1-28?arch=el5
purl pkg:rpm/redhat/sudo@1.7.2p1-28?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5h2a-syy6-67bn
1
vulnerability VCID-9x82-hwuz-kycf
2
vulnerability VCID-mfty-hg4q-x7hp
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sudo@1.7.2p1-28%3Farch=el5
10
url pkg:rpm/redhat/sudo@1.8.6p3-12?arch=el6
purl pkg:rpm/redhat/sudo@1.8.6p3-12?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-9x82-hwuz-kycf
1
vulnerability VCID-e6kf-aksq-ffbe
2
vulnerability VCID-mfty-hg4q-x7hp
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sudo@1.8.6p3-12%3Farch=el6
References
0
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
1
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-1353.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1353.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2013-1701.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1701.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2776.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2776.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2776
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.2274
published_at 2026-04-18T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22664
published_at 2026-04-01T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22838
published_at 2026-04-02T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22882
published_at 2026-04-04T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22674
published_at 2026-04-07T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22749
published_at 2026-04-08T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22801
published_at 2026-04-09T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22823
published_at 2026-04-11T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22785
published_at 2026-04-12T12:55:00Z
9
value 0.00076
scoring_system epss
scoring_elements 0.22728
published_at 2026-04-13T12:55:00Z
10
value 0.00076
scoring_system epss
scoring_elements 0.22745
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2776
6
reference_url https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://www.debian.org/security/2013/dsa-2642
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2642
11
reference_url http://www.openwall.com/lists/oss-security/2013/02/27/31
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2013/02/27/31
12
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
13
reference_url http://www.securityfocus.com/bid/58207
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/58207
14
reference_url http://www.securityfocus.com/bid/62741
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/62741
15
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
16
reference_url http://www.sudo.ws/repos/sudo/rev/049a12a5cc14
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/049a12a5cc14
17
reference_url http://www.sudo.ws/repos/sudo/rev/0c0283d1fafa
reference_id
reference_type
scores
url http://www.sudo.ws/repos/sudo/rev/0c0283d1fafa
18
reference_url http://www.sudo.ws/sudo/alerts/tty_tickets.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/tty_tickets.html
19
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
reference_id 701839
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=949751
reference_id 949751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=949751
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2776
reference_id CVE-2013-2776
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-2776
98
reference_url https://security.gentoo.org/glsa/201401-23
reference_id GLSA-201401-23
reference_type
scores
url https://security.gentoo.org/glsa/201401-23
99
reference_url https://access.redhat.com/errata/RHSA-2013:1353
reference_id RHSA-2013:1353
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1353
100
reference_url https://access.redhat.com/errata/RHSA-2013:1701
reference_id RHSA-2013:1701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1701
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score4.4 - 4.4
Exploitability0.5
Weighted_severity4.0
Risk_score2.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-9x82-hwuz-kycf