Search for vulnerabilities
Vulnerability details: VCID-xezm-x27m-aaam
Vulnerability ID VCID-xezm-x27m-aaam
Aliases CVE-2006-0151
Summary sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.
Status Published
Exploitability 0.5
Weighted Severity 6.5
Risk 3.2
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00045 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00063 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.00064 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
epss 0.0067 https://api.first.org/data/v1/epss?cve=CVE-2006-0151
rhbs low https://bugzilla.redhat.com/show_bug.cgi?id=139478
cvssv2 7.2 https://nvd.nist.gov/vuln/detail/CVE-2006-0151
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0151.json
https://api.first.org/data/v1/epss?cve=CVE-2006-0151
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0151
http://secunia.com/advisories/18358
http://secunia.com/advisories/18363
http://secunia.com/advisories/18549
http://secunia.com/advisories/18558
http://secunia.com/advisories/18906
http://secunia.com/advisories/19016
http://secunia.com/advisories/21692
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822
https://usn.ubuntu.com/235-2/
http://www.debian.org/security/2006/dsa-946
http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
http://www.novell.com/linux/security/advisories/2006_02_sr.html
http://www.securityfocus.com/bid/16184
http://www.trustix.org/errata/2006/0010
139478 https://bugzilla.redhat.com/show_bug.cgi?id=139478
cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:amd64:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:i386:*:*:*:*:*
cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.10:*:powerpc:*:*:*:*:*
CVE-2006-0151 https://nvd.nist.gov/vuln/detail/CVE-2006-0151
No exploits are available.
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2006-0151
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.17762
EPSS Score 0.00045
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.