Search for vulnerabilities
Vulnerability details: VCID-gy6n-u4ru-aaaa
Vulnerability ID VCID-gy6n-u4ru-aaaa
Aliases CVE-2010-1646
Summary The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2010:0475
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00061 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
epss 0.00078 https://api.first.org/data/v1/epss?cve=CVE-2010-1646
cvssv2 6.2 https://nvd.nist.gov/vuln/detail/CVE-2010-1646
Reference id Reference type URL
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042838.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043012.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043026.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1646.json
https://api.first.org/data/v1/epss?cve=CVE-2010-1646
https://bugzilla.redhat.com/show_bug.cgi?id=598154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646
http://secunia.com/advisories/40002
http://secunia.com/advisories/40188
http://secunia.com/advisories/40215
http://secunia.com/advisories/40508
http://secunia.com/advisories/43068
http://security.gentoo.org/glsa/glsa-201009-03.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10580
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7338
http://wiki.rpath.com/Advisories:rPSA-2010-0075
http://www.debian.org/security/2010/dsa-2062
http://www.mandriva.com/security/advisories?name=MDVSA-2010:118
http://www.osvdb.org/65083
http://www.redhat.com/support/errata/RHSA-2010-0475.html
http://www.securityfocus.com/archive/1/514489/100/0/threaded
http://www.securityfocus.com/bid/40538
http://www.securitytracker.com/id?1024101
http://www.sudo.ws/repos/sudo/rev/3057fde43cf0
http://www.sudo.ws/repos/sudo/rev/a09c6812eaec
http://www.sudo.ws/sudo/alerts/secure_path.html
http://www.vupen.com/english/advisories/2010/1452
http://www.vupen.com/english/advisories/2010/1478
http://www.vupen.com/english/advisories/2010/1518
http://www.vupen.com/english/advisories/2010/1519
http://www.vupen.com/english/advisories/2011/0212
585394 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585394
cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.2p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.2p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7p3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7p4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p10:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p11:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8p9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8p9:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p10:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p11:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p12:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p13:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p14:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p15:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p16:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p17:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p18:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p19:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.9p9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.9p9:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
CVE-2010-1646 https://nvd.nist.gov/vuln/detail/CVE-2010-1646
GLSA-201009-03 https://security.gentoo.org/glsa/201009-03
RHSA-2010:0475 https://access.redhat.com/errata/RHSA-2010:0475
USN-956-1 https://usn.ubuntu.com/956-1/
No exploits are available.
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2010-1646
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.10982
EPSS Score 0.00044
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.