{"url":"http://public2.vulnerablecode.io/api/packages/572137?format=json","purl":"pkg:deb/debian/sudo@1.7.4p4-2.squeeze.6","type":"deb","namespace":"debian","name":"sudo","version":"1.7.4p4-2.squeeze.6","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.9.13p3-1+deb12u4","latest_non_vulnerable_version":"1.9.17p2-5","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31219?format=json","vulnerability_id":"VCID-1cuy-x9m9-p3c4","summary":"Multiple vulnerabilities have been found in sudo, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3156.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3156.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3156","reference_id":"","reference_type":"","scores":[{"value":"0.92201","scoring_system":"epss","scoring_elements":"0.99718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.92309","scoring_system":"epss","scoring_elements":"0.99721","published_at":"2026-04-12T12:55:00Z"},{"value":"0.92309","scoring_system":"epss","scoring_elements":"0.99722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.92309","scoring_system":"epss","scoring_elements":"0.9972","published_at":"2026-04-13T12:55:00Z"},{"value":"0.92456","scoring_system":"epss","scoring_elements":"0.99737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.92483","scoring_system":"epss","scoring_elements":"0.99733","published_at":"2026-04-07T12:55:00Z"},{"value":"0.92483","scoring_system":"epss","scoring_elements":"0.99732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92483","scoring_system":"epss","scoring_elements":"0.9973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.92533","scoring_system":"epss","scoring_elements":"0.99742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.92533","scoring_system":"epss","scoring_elements":"0.99743","published_at":"2026-04-29T12:55:00Z"},{"value":"0.92533","scoring_system":"epss","scoring_elements":"0.99744","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/01/27/1","reference_id":"1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/01/27/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/02/15/1","reference_id":"1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/02/15/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1917684","reference_id":"1917684","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1917684"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/01/27/2","reference_id":"2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/01/27/2"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Feb/3","reference_id":"3","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Feb/3"},{"reference_url":"https://www.openwall.com/lists/oss-security/2021/01/26/3","reference_id":"3","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://www.openwall.com/lists/oss-security/2021/01/26/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/01/26/3","reference_id":"3","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/01/26/3"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Feb/42","reference_id":"42","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Feb/42"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/30/6","reference_id":"6","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/30/6"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Jan/79","reference_id":"79","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Jan/79"},{"reference_url":"https://www.kb.cert.org/vuls/id/794544","reference_id":"794544","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://www.kb.cert.org/vuls/id/794544"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/01/30/8","reference_id":"8","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/01/30/8"},{"reference_url":"https://security.archlinux.org/ASA-202101-25","reference_id":"ASA-202101-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202101-25"},{"reference_url":"https://security.archlinux.org/AVG-1431","reference_id":"AVG-1431","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1431"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII/","reference_id":"CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII/"},{"reference_url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM","reference_id":"cisco-sa-sudo-privesc-jan2021-qnYQfcM","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/49521.py","reference_id":"CVE-2021-3156","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/49521.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/49522.c","reference_id":"CVE-2021-3156","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/49522.c"},{"reference_url":"https://www.debian.org/security/2021/dsa-4839","reference_id":"dsa-4839","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://www.debian.org/security/2021/dsa-4839"},{"reference_url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","reference_id":"glibc-syslog-Heap-Based-Buffer-Overflow.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html"},{"reference_url":"https://security.gentoo.org/glsa/202101-33","reference_id":"GLSA-202101-33","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://security.gentoo.org/glsa/202101-33"},{"reference_url":"https://support.apple.com/kb/HT212177","reference_id":"HT212177","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://support.apple.com/kb/HT212177"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10348","reference_id":"index?page=content&id=SB10348","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10348"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY/","reference_id":"LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00022.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210128-0001/","reference_id":"ntap-20210128-0001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210128-0001/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210128-0002/","reference_id":"ntap-20210128-0002","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210128-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0218","reference_id":"RHSA-2021:0218","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0218"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0219","reference_id":"RHSA-2021:0219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0220","reference_id":"RHSA-2021:0220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0221","reference_id":"RHSA-2021:0221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0222","reference_id":"RHSA-2021:0222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0223","reference_id":"RHSA-2021:0223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0224","reference_id":"RHSA-2021:0224","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0224"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0225","reference_id":"RHSA-2021:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0226","reference_id":"RHSA-2021:0226","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0227","reference_id":"RHSA-2021:0227","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0227"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0395","reference_id":"RHSA-2021:0395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0401","reference_id":"RHSA-2021:0401","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0401"},{"reference_url":"https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability","reference_id":"security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://www.beyondtrust.com/blog/entry/security-advisory-privilege-management-for-unix-linux-pmul-basic-and-privilege-management-for-mac-pmm-affected-by-sudo-vulnerability"},{"reference_url":"https://www.sudo.ws/stable.html#1.9.5p2","reference_id":"stable.html#1.9.5p2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://www.sudo.ws/stable.html#1.9.5p2"},{"reference_url":"http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html","reference_id":"Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://packetstormsecurity.com/files/161293/Sudo-1.8.31p2-1.9.5p1-Buffer-Overflow.html"},{"reference_url":"http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html","reference_id":"Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html"},{"reference_url":"http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html","reference_id":"Sudo-Buffer-Overflow-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html"},{"reference_url":"https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156","reference_id":"sudoedit-pwned-cve-2021-3156","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://www.vicarius.io/vsociety/posts/sudoedit-pwned-cve-2021-3156"},{"reference_url":"http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html","reference_id":"Sudo-Heap-Based-Buffer-Overflow.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html"},{"reference_url":"https://www.synology.com/security/advisory/Synology_SA_21_02","reference_id":"Synology_SA_21_02","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-03T15:43:52Z/"}],"url":"https://www.synology.com/security/advisory/Synology_SA_21_02"},{"reference_url":"https://usn.ubuntu.com/4705-1/","reference_id":"USN-4705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4705-1/"},{"reference_url":"https://usn.ubuntu.com/4705-2/","reference_id":"USN-4705-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4705-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037908?format=json","purl":"pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.27-1%252Bdeb10u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2021-3156"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1cuy-x9m9-p3c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32069?format=json","vulnerability_id":"VCID-2jvq-feqm-rueb","summary":"A vulnerability has been found in sudo allowing a local attacker to\n    gain elevated privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0106.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0106.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0106","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16167","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16209","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16295","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16341","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16301","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16233","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16188","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16116","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16112","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15955","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0106"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0106"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1071780","reference_id":"1071780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1071780"},{"reference_url":"https://security.gentoo.org/glsa/201406-30","reference_id":"GLSA-201406-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0266","reference_id":"RHSA-2014:0266","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0266"},{"reference_url":"https://usn.ubuntu.com/2146-1/","reference_id":"USN-2146-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2146-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"}],"aliases":["CVE-2014-0106"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jvq-feqm-rueb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49312?format=json","vulnerability_id":"VCID-3hfe-p6e3-tbe9","summary":"Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28487.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28487.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28487","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33339","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33332","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33145","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.32932","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33462","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28487"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179273","reference_id":"2179273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179273"},{"reference_url":"https://security.gentoo.org/glsa/202309-12","reference_id":"GLSA-202309-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0811","reference_id":"RHSA-2024:0811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1383","reference_id":"RHSA-2024:1383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1383"},{"reference_url":"https://usn.ubuntu.com/6005-1/","reference_id":"USN-6005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6005-1/"},{"reference_url":"https://usn.ubuntu.com/6005-2/","reference_id":"USN-6005-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6005-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026140?format=json","purl":"pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3"}],"aliases":["CVE-2023-28487"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3hfe-p6e3-tbe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58822?format=json","vulnerability_id":"VCID-49cf-c1kh-27cf","summary":"Two vulnerabilities have been discovered in sudo, allowing local\n    attackers to possibly gain escalated privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0809.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0809","reference_id":"","reference_type":"","scores":[{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97601","published_at":"2026-04-07T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.9761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97615","published_at":"2026-04-13T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97626","published_at":"2026-04-26T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.9763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.45602","scoring_system":"epss","scoring_elements":"0.97636","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0809"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657985","reference_id":"657985","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657985"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=784443","reference_id":"784443","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=784443"},{"reference_url":"http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt","reference_id":"CVE-2012-0809;OSVDB-78659","reference_type":"exploit","scores":[],"url":"http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/25134.c","reference_id":"CVE-2012-0809;OSVDB-78659","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/25134.c"},{"reference_url":"https://security.gentoo.org/glsa/201203-06","reference_id":"GLSA-201203-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-06"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18436.txt","reference_id":"OSVDB-78659;CVE-2012-0809","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/18436.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"}],"aliases":["CVE-2012-0809"],"risk_score":0.8,"exploitability":"2.0","weighted_severity":"0.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-49cf-c1kh-27cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62536?format=json","vulnerability_id":"VCID-5h2a-syy6-67bn","summary":"Multiple vulnerabilities have been found in sudo which could result\n    in privilege escalation.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1353.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1353.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1776.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1776","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1551","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15421","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15508","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15522","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15484","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15418","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15343","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15392","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15436","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15435","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15379","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1776"},{"reference_url":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82453","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82453"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2013/dsa-2642","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2642"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/27/31","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/27/31"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/58207","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58207"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/632f8e028191","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/632f8e028191"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/6b22be4d09f0","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/6b22be4d09f0"},{"reference_url":"http://www.sudo.ws/sudo/alerts/tty_tickets.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/sudo/alerts/tty_tickets.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839","reference_id":"701839","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=916365","reference_id":"916365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=916365"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1776","reference_id":"CVE-2013-1776","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1776"},{"reference_url":"https://security.gentoo.org/glsa/201401-23","reference_id":"GLSA-201401-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1353","reference_id":"RHSA-2013:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1353"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"}],"aliases":["CVE-2013-1776"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5h2a-syy6-67bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84818?format=json","vulnerability_id":"VCID-71wy-ujxu-bbfj","summary":"sudo: noexec bypass via wordexp()","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2872.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2872.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7076.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7076","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2262","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22898","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22731","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22725","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2272","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23042","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22948","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22982","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22926","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22941","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22935","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7076"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20181127-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20181127-0002/"},{"reference_url":"https://www.sudo.ws/alerts/noexec_wordexp.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sudo.ws/alerts/noexec_wordexp.html"},{"reference_url":"http://www.securityfocus.com/bid/95778","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/95778"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1384982","reference_id":"1384982","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1384982"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842507","reference_id":"842507","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842507"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7076","reference_id":"CVE-2016-7076","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2872","reference_id":"RHSA-2016:2872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2872"},{"reference_url":"https://usn.ubuntu.com/3968-1/","reference_id":"USN-3968-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3968-1/"},{"reference_url":"https://usn.ubuntu.com/3968-3/","reference_id":"USN-3968-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3968-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036993?format=json","purl":"pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2"}],"aliases":["CVE-2016-7076"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71wy-ujxu-bbfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31218?format=json","vulnerability_id":"VCID-7w9w-4whw-9bgk","summary":"Multiple vulnerabilities have been found in sudo, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23240.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23240","reference_id":"","reference_type":"","scores":[{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.42882","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43163","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43099","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43017","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45218","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45239","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45206","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4526","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45254","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45118","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45199","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45164","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23240"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1915053","reference_id":"1915053","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1915053"},{"reference_url":"https://security.archlinux.org/AVG-1432","reference_id":"AVG-1432","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1432"},{"reference_url":"https://security.gentoo.org/glsa/202101-33","reference_id":"GLSA-202101-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1723","reference_id":"RHSA-2021:1723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1723"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2021-23240"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7w9w-4whw-9bgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85458?format=json","vulnerability_id":"VCID-8r7f-bt93-qqcq","summary":"sudo: Race condition when checking digests in sudoers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8239.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8239","reference_id":"","reference_type":"","scores":[{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75384","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75377","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75246","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75308","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75296","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75342","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00876","scoring_system":"epss","scoring_elements":"0.75368","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8239"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.sudo.ws/repos/sudo/rev/0cd3cc8fa195","reference_id":"","reference_type":"","scores":[],"url":"https://www.sudo.ws/repos/sudo/rev/0cd3cc8fa195"},{"reference_url":"https://www.sudo.ws/repos/sudo/rev/24a3d9215c64","reference_id":"","reference_type":"","scores":[],"url":"https://www.sudo.ws/repos/sudo/rev/24a3d9215c64"},{"reference_url":"https://www.sudo.ws/repos/sudo/rev/397722cdd7ec","reference_id":"","reference_type":"","scores":[],"url":"https://www.sudo.ws/repos/sudo/rev/397722cdd7ec"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/11/18/22","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/11/18/22"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1283635","reference_id":"1283635","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1283635"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805563","reference_id":"805563","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=805563"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:b4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:b4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.10:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.10:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:b4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:b4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.11:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.11:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.12:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.12:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.12:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.12:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.12:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.12:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.13:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.13:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.13:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.13:b4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:b4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.13:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.13:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.13:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:b4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:b4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.14:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.14:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:b4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:b5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:b5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.15:rc3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.15:rc3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.8:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.8:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.8:b3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:b3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.8:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.8:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:b1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:b1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:b1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:b2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:b2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:b2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:p1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:p4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:p5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:p5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:rc2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:1.8.9:rc2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:1.8.9:rc2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8239","reference_id":"CVE-2015-8239","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8239"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036993?format=json","purl":"pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2"}],"aliases":["CVE-2015-8239"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8r7f-bt93-qqcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59345?format=json","vulnerability_id":"VCID-9a7y-2e2u-ebbf","summary":"sudo is vulnerable to an escalation of privileges via a symlink\n    attack.","references":[{"reference_url":"http://bugzilla.sudo.ws/show_bug.cgi?id=707","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.sudo.ws/show_bug.cgi?id=707"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5602.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5602","reference_id":"","reference_type":"","scores":[{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.9027","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.9019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90193","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.9021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90226","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90241","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.9024","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90248","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90261","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05506","scoring_system":"epss","scoring_elements":"0.90258","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5602"},{"reference_url":"https://www.exploit-db.com/exploits/37710/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/37710/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3440","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3440"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.securitytracker.com/id/1034392","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034392"},{"reference_url":"http://www.sudo.ws/stable.html#1.8.15","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/stable.html#1.8.15"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277426","reference_id":"1277426","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1277426"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804149","reference_id":"804149","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804149"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5602","reference_id":"CVE-2015-5602","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5602"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37710.txt","reference_id":"CVE-2015-5602;OSVDB-125548","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37710.txt"},{"reference_url":"https://security.gentoo.org/glsa/201606-13","reference_id":"GLSA-201606-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201606-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1036716?format=json","purl":"pkg:deb/debian/sudo@1.8.10p3-1%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.10p3-1%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1036993?format=json","purl":"pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2"}],"aliases":["CVE-2015-5602"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9a7y-2e2u-ebbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82263?format=json","vulnerability_id":"VCID-9fh6-mr57-wba8","summary":"sudo: Improper handling of ipa_hostname leads to privilege mismanagement","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7090.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7090.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-7090","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24037","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24105","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24151","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2407","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24083","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24053","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23915","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23874","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2376","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-7090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7090"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255723","reference_id":"2255723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255723"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2023-7090"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9fh6-mr57-wba8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58821?format=json","vulnerability_id":"VCID-9whc-9uum-sbfq","summary":"Two vulnerabilities have been discovered in sudo, allowing local\n    attackers to possibly gain escalated privileges.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"},{"reference_url":"http://openwall.com/lists/oss-security/2011/01/11/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/01/11/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/01/12/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/01/12/1"},{"reference_url":"http://openwall.com/lists/oss-security/2011/01/12/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/01/12/3"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0010.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0010","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29205","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29745","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29653","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29608","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.2935","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010"},{"reference_url":"http://secunia.com/advisories/42886","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42886"},{"reference_url":"http://secunia.com/advisories/42949","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42949"},{"reference_url":"http://secunia.com/advisories/42968","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42968"},{"reference_url":"http://secunia.com/advisories/43068","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43068"},{"reference_url":"http://secunia.com/advisories/43282","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43282"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201203-06.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201203-06.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64636","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/64636"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593654","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593654"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:018","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:018"},{"reference_url":"http://www.osvdb.org/70400","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/70400"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0599.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0599.html"},{"reference_url":"http://www.securityfocus.com/bid/45774","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45774"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/07d1b0ce530e","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/07d1b0ce530e"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/fe8a94f96542","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/fe8a94f96542"},{"reference_url":"http://www.sudo.ws/sudo/alerts/runas_group_pw.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/sudo/alerts/runas_group_pw.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1046-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1046-1"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0089","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0089"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0182","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0182"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0195","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0195"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0199","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0199"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0212","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0212"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0362","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0362"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641","reference_id":"609641","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=668879","reference_id":"668879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=668879"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0010","reference_id":"CVE-2011-0010","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0010"},{"reference_url":"https://security.gentoo.org/glsa/201203-06","reference_id":"GLSA-201203-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0599","reference_id":"RHSA-2011:0599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0309","reference_id":"RHSA-2012:0309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0309"},{"reference_url":"https://usn.ubuntu.com/1046-1/","reference_id":"USN-1046-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1046-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"}],"aliases":["CVE-2011-0010"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9whc-9uum-sbfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62537?format=json","vulnerability_id":"VCID-9x82-hwuz-kycf","summary":"Multiple vulnerabilities have been found in sudo which could result\n    in privilege escalation.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1353.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1353.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1701.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2776.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2776","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2243","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22664","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22838","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22801","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22823","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22785","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22745","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22699","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22537","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22526","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2776"},{"reference_url":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82453","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82453"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2013/dsa-2642","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2642"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/27/31","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/27/31"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/58207","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58207"},{"reference_url":"http://www.securityfocus.com/bid/62741","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/62741"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/049a12a5cc14","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/049a12a5cc14"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/0c0283d1fafa","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/0c0283d1fafa"},{"reference_url":"http://www.sudo.ws/sudo/alerts/tty_tickets.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/sudo/alerts/tty_tickets.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839","reference_id":"701839","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=949751","reference_id":"949751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=949751"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2776","reference_id":"CVE-2013-2776","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2776"},{"reference_url":"https://security.gentoo.org/glsa/201401-23","reference_id":"GLSA-201401-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1353","reference_id":"RHSA-2013:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1701","reference_id":"RHSA-2013:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1701"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"}],"aliases":["CVE-2013-2776"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9x82-hwuz-kycf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48142?format=json","vulnerability_id":"VCID-9y5c-e765-tqgt","summary":"A vulnerability in sudo allows local users to gain root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000368.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000368","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34856","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35322","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35088","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35067","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37733","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37676","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37691","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37656","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37628","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37612","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459152","reference_id":"1459152","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1459152"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863897","reference_id":"863897","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863897"},{"reference_url":"https://security.gentoo.org/glsa/201710-04","reference_id":"GLSA-201710-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1574","reference_id":"RHSA-2017:1574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1574"},{"reference_url":"https://usn.ubuntu.com/3968-1/","reference_id":"USN-3968-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3968-1/"},{"reference_url":"https://usn.ubuntu.com/3968-2/","reference_id":"USN-3968-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3968-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037908?format=json","purl":"pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.27-1%252Bdeb10u3"}],"aliases":["CVE-2017-1000368"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9y5c-e765-tqgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62538?format=json","vulnerability_id":"VCID-e6kf-aksq-ffbe","summary":"Multiple vulnerabilities have been found in sudo which could result\n    in privilege escalation.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1701.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2777.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2777","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14712","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14763","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14643","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14551","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14556","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14651","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14586","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2777"},{"reference_url":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82453","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82453"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2013/dsa-2642","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2642"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/27/31","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/27/31"},{"reference_url":"http://www.securityfocus.com/bid/58207","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58207"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/2f3225a2a4a4","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/2f3225a2a4a4"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/bfa23f089bba","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/bfa23f089bba"},{"reference_url":"http://www.sudo.ws/sudo/alerts/tty_tickets.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/sudo/alerts/tty_tickets.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839","reference_id":"701839","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=949753","reference_id":"949753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=949753"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2777","reference_id":"CVE-2013-2777","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-2777"},{"reference_url":"https://security.gentoo.org/glsa/201401-23","reference_id":"GLSA-201401-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1701","reference_id":"RHSA-2013:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1701"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"}],"aliases":["CVE-2013-2777"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6kf-aksq-ffbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56450?format=json","vulnerability_id":"VCID-enw3-mnnx-myd5","summary":"A vulnerability has been discovered in sudo which could result in root privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22809.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22809","reference_id":"","reference_type":"","scores":[{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.97709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.9774","published_at":"2026-05-05T12:55:00Z"},{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.97731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.97728","published_at":"2026-04-16T12:55:00Z"},{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.97723","published_at":"2026-04-13T12:55:00Z"},{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.97722","published_at":"2026-04-12T12:55:00Z"},{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.97719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.97717","published_at":"2026-04-09T12:55:00Z"},{"value":"0.48016","scoring_system":"epss","scoring_elements":"0.97713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.48605","scoring_system":"epss","scoring_elements":"0.97767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.48605","scoring_system":"epss","scoring_elements":"0.97761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.48605","scoring_system":"epss","scoring_elements":"0.9776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.5353","scoring_system":"epss","scoring_elements":"0.97974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.54539","scoring_system":"epss","scoring_elements":"0.98017","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/01/19/1","reference_id":"1","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/01/19/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Aug/21","reference_id":"21","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Aug/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2161142","reference_id":"2161142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2161142"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/","reference_id":"2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QDGFCGAV5QRJCE6IXRXIS4XJHS57DDH/"},{"reference_url":"http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html","reference_id":"Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51217.sh","reference_id":"CVE-2023-22809","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/51217.sh"},{"reference_url":"https://www.debian.org/security/2023/dsa-5321","reference_id":"dsa-5321","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://www.debian.org/security/2023/dsa-5321"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4YNBTTKTRT2ME3NTSXAPTOKYUE47XHZ/","reference_id":"G4YNBTTKTRT2ME3NTSXAPTOKYUE47XHZ","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4YNBTTKTRT2ME3NTSXAPTOKYUE47XHZ/"},{"reference_url":"https://security.gentoo.org/glsa/202305-12","reference_id":"GLSA-202305-12","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://security.gentoo.org/glsa/202305-12"},{"reference_url":"https://support.apple.com/kb/HT213758","reference_id":"HT213758","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://support.apple.com/kb/HT213758"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00012.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230127-0015/","reference_id":"ntap-20230127-0015","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230127-0015/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0280","reference_id":"RHSA-2023:0280","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0281","reference_id":"RHSA-2023:0281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0282","reference_id":"RHSA-2023:0282","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0283","reference_id":"RHSA-2023:0283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0284","reference_id":"RHSA-2023:0284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0287","reference_id":"RHSA-2023:0287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0291","reference_id":"RHSA-2023:0291","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0292","reference_id":"RHSA-2023:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0293","reference_id":"RHSA-2023:0293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0859","reference_id":"RHSA-2023:0859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3262","reference_id":"RHSA-2023:3262","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3262"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3264","reference_id":"RHSA-2023:3264","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3264"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3276","reference_id":"RHSA-2023:3276","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3276"},{"reference_url":"http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html","reference_id":"sudo-1.9.12p1-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html"},{"reference_url":"https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf","reference_id":"sudo-CVE-2023-22809.pdf","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf"},{"reference_url":"https://www.sudo.ws/security/advisories/sudoedit_any/","reference_id":"sudoedit_any","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"https://www.sudo.ws/security/advisories/sudoedit_any/"},{"reference_url":"http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html","reference_id":"Sudoedit-Extra-Arguments-Privilege-Escalation.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T15:43:57Z/"}],"url":"http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html"},{"reference_url":"https://usn.ubuntu.com/5811-1/","reference_id":"USN-5811-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5811-1/"},{"reference_url":"https://usn.ubuntu.com/5811-2/","reference_id":"USN-5811-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5811-2/"},{"reference_url":"https://usn.ubuntu.com/5811-3/","reference_id":"USN-5811-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5811-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2023-22809"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-enw3-mnnx-myd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81718?format=json","vulnerability_id":"VCID-esf1-4zw7-5fcy","summary":"sudo: attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19232.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19232.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19232","reference_id":"","reference_type":"","scores":[{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.862","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.8621","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86254","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86266","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86262","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86277","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86282","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86294","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86304","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02868","scoring_system":"epss","scoring_elements":"0.86323","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19232"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19232","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19232"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786704","reference_id":"1786704","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786704"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947225","reference_id":"947225","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1804","reference_id":"RHSA-2020:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1804"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2019-19232"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-esf1-4zw7-5fcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49311?format=json","vulnerability_id":"VCID-ethj-8jmj-5fdh","summary":"Multiple vulnerabilities have been found in sudo, the worst of which can result in root privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28486.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28486","reference_id":"","reference_type":"","scores":[{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33381","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33339","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33332","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33145","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.32932","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33462","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28486"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179272","reference_id":"2179272","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179272"},{"reference_url":"https://security.gentoo.org/glsa/202309-12","reference_id":"GLSA-202309-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202309-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0811","reference_id":"RHSA-2024:0811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1383","reference_id":"RHSA-2024:1383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1383"},{"reference_url":"https://usn.ubuntu.com/6005-1/","reference_id":"USN-6005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6005-1/"},{"reference_url":"https://usn.ubuntu.com/6005-2/","reference_id":"USN-6005-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6005-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026140?format=json","purl":"pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3"}],"aliases":["CVE-2023-28486"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ethj-8jmj-5fdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51623?format=json","vulnerability_id":"VCID-j63t-xqk3-p3dk","summary":"A vulnerability in sudo could allow a local attacker to read\n    arbitrary files or bypass security restrictions.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2014/10/15/24","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/10/15/24"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1409.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1409.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9680.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9680.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9680","reference_id":"","reference_type":"","scores":[{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61304","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.6136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61354","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61287","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61284","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61367","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61352","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61333","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61372","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61376","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61356","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0041","scoring_system":"epss","scoring_elements":"0.61345","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9680"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1033158","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1033158"},{"reference_url":"http://www.sudo.ws/alerts/tz.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/alerts/tz.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191144","reference_id":"1191144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1191144"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772707","reference_id":"772707","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772707"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:p2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:*:p2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:p2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9680","reference_id":"CVE-2014-9680","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9680"},{"reference_url":"https://security.gentoo.org/glsa/201504-02","reference_id":"GLSA-201504-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201504-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1409","reference_id":"RHSA-2015:1409","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1409"},{"reference_url":"https://usn.ubuntu.com/2533-1/","reference_id":"USN-2533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2533-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1036993?format=json","purl":"pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2"}],"aliases":["CVE-2014-9680"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j63t-xqk3-p3dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31216?format=json","vulnerability_id":"VCID-k42r-mk4h-mbbg","summary":"Multiple vulnerabilities have been found in sudo, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23239.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23239.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23239","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26412","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26681","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26545","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36095","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36002","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36008","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35985","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35971","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35875","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36066","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3593","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-23239"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23239"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1915052","reference_id":"1915052","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1915052"},{"reference_url":"https://security.archlinux.org/ASA-202101-25","reference_id":"ASA-202101-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202101-25"},{"reference_url":"https://security.archlinux.org/AVG-1431","reference_id":"AVG-1431","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1431"},{"reference_url":"https://security.gentoo.org/glsa/202101-33","reference_id":"GLSA-202101-33","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1723","reference_id":"RHSA-2021:1723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1723"},{"reference_url":"https://usn.ubuntu.com/4705-1/","reference_id":"USN-4705-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4705-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2021-23239"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k42r-mk4h-mbbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84817?format=json","vulnerability_id":"VCID-kzje-6t7q-rudw","summary":"sudo: noexec bypass via system() and popen()","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2872.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2872.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7032.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7032.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7032","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14401","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14584","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14525","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14724","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14685","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14647","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14483","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14488","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14553","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7032"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:C/I:C/A:C"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.sudo.ws/alerts/noexec_bypass.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sudo.ws/alerts/noexec_bypass.html"},{"reference_url":"http://www.securityfocus.com/bid/95776","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/95776"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372830","reference_id":"1372830","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1372830"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.14:p3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.14:p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.14:p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7032","reference_id":"CVE-2016-7032","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7032"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2872","reference_id":"RHSA-2016:2872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2872"},{"reference_url":"https://usn.ubuntu.com/3968-3/","reference_id":"USN-3968-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3968-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036993?format=json","purl":"pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2"}],"aliases":["CVE-2016-7032"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kzje-6t7q-rudw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62535?format=json","vulnerability_id":"VCID-mfty-hg4q-x7hp","summary":"Multiple vulnerabilities have been found in sudo which could result\n    in privilege escalation.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html"},{"reference_url":"http://osvdb.org/90677","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/90677"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1353.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1353.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1701.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1701.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1775.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1775","reference_id":"","reference_type":"","scores":[{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92191","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92149","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.9218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92181","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://support.apple.com/kb/HT5880","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT5880"},{"reference_url":"http://www.debian.org/security/2013/dsa-2642","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2642"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/02/27/22","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/02/27/22"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.securityfocus.com/bid/58203","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58203"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/ddf399e3e306","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/ddf399e3e306"},{"reference_url":"http://www.sudo.ws/repos/sudo/rev/ebd6cc75020f","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/repos/sudo/rev/ebd6cc75020f"},{"reference_url":"http://www.sudo.ws/sudo/alerts/epoch_ticket.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/sudo/alerts/epoch_ticket.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1754-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1754-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701838","reference_id":"701838","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701838"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=916363","reference_id":"916363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=916363"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1775","reference_id":"CVE-2013-1775","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1775"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27944.rb","reference_id":"CVE-2013-1775;OSVDB-90677","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27944.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27965.py","reference_id":"CVE-2013-1775;OSVDB-90677","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/local/27965.py"},{"reference_url":"https://security.gentoo.org/glsa/201401-23","reference_id":"GLSA-201401-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-23"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1353","reference_id":"RHSA-2013:1353","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1353"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1701","reference_id":"RHSA-2013:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1701"},{"reference_url":"https://usn.ubuntu.com/1754-1/","reference_id":"USN-1754-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1754-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"}],"aliases":["CVE-2013-1775"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfty-hg4q-x7hp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36653?format=json","vulnerability_id":"VCID-ngg5-bqw7-bbc4","summary":"Multiple vulnerabilities have been discovered in sudo, the worst of which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32462.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32462","reference_id":"","reference_type":"","scores":[{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95761","published_at":"2026-04-24T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95759","published_at":"2026-04-21T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95757","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95754","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95742","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95743","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.21724","scoring_system":"epss","scoring_elements":"0.95727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30014","scoring_system":"epss","scoring_elements":"0.96669","published_at":"2026-04-26T12:55:00Z"},{"value":"0.30014","scoring_system":"epss","scoring_elements":"0.96679","published_at":"2026-05-05T12:55:00Z"},{"value":"0.33452","scoring_system":"epss","scoring_elements":"0.96945","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-32462"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.openwall.com/lists/oss-security/2025/06/30/2","reference_id":"2","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://www.openwall.com/lists/oss-security/2025/06/30/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2374692","reference_id":"2374692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2374692"},{"reference_url":"https://www.sudo.ws/security/advisories/","reference_id":"advisories","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://www.sudo.ws/security/advisories/"},{"reference_url":"https://www.sudo.ws/releases/changelog/","reference_id":"changelog","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://www.sudo.ws/releases/changelog/"},{"reference_url":"https://access.redhat.com/security/cve/cve-2025-32462","reference_id":"cve-2025-32462","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://access.redhat.com/security/cve/cve-2025-32462"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52354.txt","reference_id":"CVE-2025-32462","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52354.txt"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2025-32462","reference_id":"CVE-2025-32462","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2025-32462"},{"reference_url":"https://explore.alas.aws.amazon.com/CVE-2025-32462.html","reference_id":"CVE-2025-32462.html","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://explore.alas.aws.amazon.com/CVE-2025-32462.html"},{"reference_url":"https://www.suse.com/security/cve/CVE-2025-32462.html","reference_id":"CVE-2025-32462.html","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://www.suse.com/security/cve/CVE-2025-32462.html"},{"reference_url":"https://security.gentoo.org/glsa/202507-01","reference_id":"GLSA-202507-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202507-01"},{"reference_url":"https://www.sudo.ws/security/advisories/host_any/","reference_id":"host_any","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://www.sudo.ws/security/advisories/host_any/"},{"reference_url":"https://lists.debian.org/debian-security-announce/2025/msg00118.html","reference_id":"msg00118.html","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://lists.debian.org/debian-security-announce/2025/msg00118.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10110","reference_id":"RHSA-2025:10110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10383","reference_id":"RHSA-2025:10383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10518","reference_id":"RHSA-2025:10518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10520","reference_id":"RHSA-2025:10520","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10520"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10707","reference_id":"RHSA-2025:10707","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10767","reference_id":"RHSA-2025:10767","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10771","reference_id":"RHSA-2025:10771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10779","reference_id":"RHSA-2025:10779","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10781","reference_id":"RHSA-2025:10781","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10835","reference_id":"RHSA-2025:10835","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10835"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10836","reference_id":"RHSA-2025:10836","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10871","reference_id":"RHSA-2025:10871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11537","reference_id":"RHSA-2025:11537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12323","reference_id":"RHSA-2025:12323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12370","reference_id":"RHSA-2025:12370","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12370"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12437","reference_id":"RHSA-2025:12437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13289","reference_id":"RHSA-2025:13289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15672","reference_id":"RHSA-2025:15672","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15672"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9978","reference_id":"RHSA-2025:9978","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9978"},{"reference_url":"https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32462","reference_id":"show_bug.cgi?id=CVE-2025-32462","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://bugs.gentoo.org/show_bug.cgi?id=CVE-2025-32462"},{"reference_url":"https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/","reference_id":"sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://www.secpod.com/blog/sudo-lpe-vulnerabilities-resolved-what-you-need-to-know-about-cve-2025-32462-and-cve-2025-32463/"},{"reference_url":"https://ubuntu.com/security/notices/USN-7604-1","reference_id":"USN-7604-1","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://ubuntu.com/security/notices/USN-7604-1"},{"reference_url":"https://usn.ubuntu.com/7604-1/","reference_id":"USN-7604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7604-1/"},{"reference_url":"https://usn.ubuntu.com/7604-2/","reference_id":"USN-7604-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7604-2/"},{"reference_url":"https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host","reference_id":"vulnerability-alert-CVE-2025-32462-sudo-host","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T13:25:34Z/"}],"url":"https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026140?format=json","purl":"pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3"}],"aliases":["CVE-2025-32462"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngg5-bqw7-bbc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34977?format=json","vulnerability_id":"VCID-p5yv-48ry-dfe7","summary":"Multiple vulnerabilities have been found in sudo, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18634.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18634","reference_id":"","reference_type":"","scores":[{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99466","published_at":"2026-05-05T12:55:00Z"},{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99458","published_at":"2026-04-11T12:55:00Z"},{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99462","published_at":"2026-04-16T12:55:00Z"},{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99463","published_at":"2026-04-18T12:55:00Z"},{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99465","published_at":"2026-04-24T12:55:00Z"},{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99455","published_at":"2026-04-07T12:55:00Z"},{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99456","published_at":"2026-04-08T12:55:00Z"},{"value":"0.87468","scoring_system":"epss","scoring_elements":"0.99457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.87602","scoring_system":"epss","scoring_elements":"0.99468","published_at":"2026-04-21T12:55:00Z"},{"value":"0.88561","scoring_system":"epss","scoring_elements":"0.995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.88561","scoring_system":"epss","scoring_elements":"0.99498","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18634"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1796944","reference_id":"1796944","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1796944"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950371","reference_id":"950371","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=950371"},{"reference_url":"https://security.archlinux.org/ASA-202002-2","reference_id":"ASA-202002-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-2"},{"reference_url":"https://security.archlinux.org/AVG-1093","reference_id":"AVG-1093","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1093"},{"reference_url":"https://github.com/Plazmaz/CVE-2019-18634/blob/b348e738a83fd4180b3ec26ed216535547f3bb8a/self-contained.sh","reference_id":"CVE-2019-18634","reference_type":"exploit","scores":[],"url":"https://github.com/Plazmaz/CVE-2019-18634/blob/b348e738a83fd4180b3ec26ed216535547f3bb8a/self-contained.sh"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/47995.txt","reference_id":"CVE-2019-18634","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/47995.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/48052.sh","reference_id":"CVE-2019-18634","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/48052.sh"},{"reference_url":"https://security.gentoo.org/glsa/202003-12","reference_id":"GLSA-202003-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0487","reference_id":"RHSA-2020:0487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0509","reference_id":"RHSA-2020:0509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0540","reference_id":"RHSA-2020:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0726","reference_id":"RHSA-2020:0726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0726"},{"reference_url":"https://usn.ubuntu.com/4263-1/","reference_id":"USN-4263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4263-1/"},{"reference_url":"https://usn.ubuntu.com/4263-2/","reference_id":"USN-4263-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4263-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036993?format=json","purl":"pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2019-18634"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p5yv-48ry-dfe7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34976?format=json","vulnerability_id":"VCID-pj45-2vrx-6fcv","summary":"Multiple vulnerabilities have been found in sudo, the worst of\n    which could result in privilege escalation.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00047.html"},{"reference_url":"http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html"},{"reference_url":"https://access.redhat.com/errata/RHBA-2019:3248","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:3248"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14287.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14287","reference_id":"","reference_type":"","scores":[{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99377","published_at":"2026-04-01T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99388","published_at":"2026-05-05T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99385","published_at":"2026-04-21T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99379","published_at":"2026-04-04T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.85814","scoring_system":"epss","scoring_elements":"0.99382","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-14287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00022.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IP7SIOAVLSKJGMTIULX52VQUPTVSC43U/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IP7SIOAVLSKJGMTIULX52VQUPTVSC43U/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPLAM57TPJQGKQMNG6RHFBLACD6K356N/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPLAM57TPJQGKQMNG6RHFBLACD6K356N/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUVAOZBYUHZS56A5FQSCDVGXT7PW7FL2/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUVAOZBYUHZS56A5FQSCDVGXT7PW7FL2/"},{"reference_url":"https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287","reference_id":"","reference_type":"","scores":[],"url":"https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/20","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Oct/20"},{"reference_url":"https://seclists.org/bugtraq/2019/Oct/21","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Oct/21"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191017-0003/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20191017-0003/"},{"reference_url":"https://support.f5.com/csp/article/K53746212?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K53746212?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us"},{"reference_url":"https://www.debian.org/security/2019/dsa-4543","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4543"},{"reference_url":"https://www.openwall.com/lists/oss-security/2019/10/15/2","reference_id":"","reference_type":"","scores":[],"url":"https://www.openwall.com/lists/oss-security/2019/10/15/2"},{"reference_url":"https://www.sudo.ws/alerts/minus_1_uid.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sudo.ws/alerts/minus_1_uid.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/10/14/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/10/14/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/10/24/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/10/24/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/10/29/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2019/10/29/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/09/14/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2021/09/14/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760531","reference_id":"1760531","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1760531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942322","reference_id":"942322","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942322"},{"reference_url":"https://security.archlinux.org/ASA-201910-9","reference_id":"ASA-201910-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-9"},{"reference_url":"https://security.archlinux.org/AVG-1047","reference_id":"AVG-1047","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1047"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management_node:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47502.py","reference_id":"CVE-2019-14287","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/47502.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14287","reference_id":"CVE-2019-14287","reference_type":"","scores":[{"value":"9.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-14287"},{"reference_url":"https://security.gentoo.org/glsa/202003-12","reference_id":"GLSA-202003-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3197","reference_id":"RHSA-2019:3197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3204","reference_id":"RHSA-2019:3204","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3205","reference_id":"RHSA-2019:3205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3209","reference_id":"RHSA-2019:3209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3209"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3219","reference_id":"RHSA-2019:3219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3278","reference_id":"RHSA-2019:3278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3694","reference_id":"RHSA-2019:3694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3754","reference_id":"RHSA-2019:3754","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3754"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3755","reference_id":"RHSA-2019:3755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3755"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3895","reference_id":"RHSA-2019:3895","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3895"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3916","reference_id":"RHSA-2019:3916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3941","reference_id":"RHSA-2019:3941","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4191","reference_id":"RHSA-2019:4191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0388","reference_id":"RHSA-2020:0388","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0388"},{"reference_url":"https://usn.ubuntu.com/4154-1/","reference_id":"USN-4154-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4154-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036993?format=json","purl":"pkg:deb/debian/sudo@1.8.19p1-2.1%2Bdeb9u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.19p1-2.1%252Bdeb9u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1037908?format=json","purl":"pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.27-1%252Bdeb10u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2019-14287"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pj45-2vrx-6fcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81719?format=json","vulnerability_id":"VCID-pyfy-88dw-9ba8","summary":"sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19234.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19234.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19234","reference_id":"","reference_type":"","scores":[{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.8852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88539","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88555","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88547","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.88577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04075","scoring_system":"epss","scoring_elements":"0.8859","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19234"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19234","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19234"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786708","reference_id":"1786708","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1786708"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947225","reference_id":"947225","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1804","reference_id":"RHSA-2020:1804","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1804"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1026139?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1"}],"aliases":["CVE-2019-19234"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyfy-88dw-9ba8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35556?format=json","vulnerability_id":"VCID-t9g1-j9ej-ufcq","summary":"A vulnerability has been found in sudo which may allow local users\n    to gain escalated privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2337.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2337.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2337","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14588","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14708","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14521","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14626","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14423","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14495","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14527","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14468","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14345","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673766","reference_id":"673766","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=673766"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=820677","reference_id":"820677","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=820677"},{"reference_url":"https://security.gentoo.org/glsa/201207-01","reference_id":"GLSA-201207-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201207-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1081","reference_id":"RHSA-2012:1081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1081"},{"reference_url":"https://usn.ubuntu.com/1442-1/","reference_id":"USN-1442-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1442-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572138?format=json","purl":"pkg:deb/debian/sudo@1.8.5p2-1%2Bnmu3%2Bdeb7u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.5p2-1%252Bnmu3%252Bdeb7u1"}],"aliases":["CVE-2012-2337"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t9g1-j9ej-ufcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36531?format=json","vulnerability_id":"VCID-zd6m-f7x1-kkaa","summary":"A vulnerability in sudo allows local users to gain root privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000367.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000367","reference_id":"","reference_type":"","scores":[{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95348","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95393","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95397","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95401","published_at":"2026-04-24T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95403","published_at":"2026-04-26T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95364","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95369","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19435","scoring_system":"epss","scoring_elements":"0.95385","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19918","scoring_system":"epss","scoring_elements":"0.95479","published_at":"2026-04-29T12:55:00Z"},{"value":"0.19918","scoring_system":"epss","scoring_elements":"0.95488","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1453074","reference_id":"1453074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1453074"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863731","reference_id":"863731","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863731"},{"reference_url":"https://security.archlinux.org/ASA-201705-25","reference_id":"ASA-201705-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201705-25"},{"reference_url":"https://security.archlinux.org/AVG-282","reference_id":"AVG-282","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-282"},{"reference_url":"http://seclists.org/oss-sec/2017/q2/470","reference_id":"CVE-2017-1000367","reference_type":"exploit","scores":[],"url":"http://seclists.org/oss-sec/2017/q2/470"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42183.c","reference_id":"CVE-2017-1000367","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/42183.c"},{"reference_url":"https://security.gentoo.org/glsa/201705-15","reference_id":"GLSA-201705-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201705-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1381","reference_id":"RHSA-2017:1381","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1381"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1382","reference_id":"RHSA-2017:1382","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1382"},{"reference_url":"https://usn.ubuntu.com/3304-1/","reference_id":"USN-3304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3304-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036716?format=json","purl":"pkg:deb/debian/sudo@1.8.10p3-1%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.10p3-1%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037908?format=json","purl":"pkg:deb/debian/sudo@1.8.27-1%2Bdeb10u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.8.27-1%252Bdeb10u3"}],"aliases":["CVE-2017-1000367"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zd6m-f7x1-kkaa"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.7.4p4-2.squeeze.6"}