Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-1s26-jrut-puf4
SummaryCVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)
Aliases
0
alias CVE-2004-1051
Fixed_packages
0
url pkg:deb/debian/sudo@1.6.8p3-1?distro=trixie
purl pkg:deb/debian/sudo@1.6.8p3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p3-1%3Fdistro=trixie
1
url pkg:deb/debian/sudo@1.6.8p7-1.4
purl pkg:deb/debian/sudo@1.6.8p7-1.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-2b4p-nehx-eyae
2
vulnerability VCID-2jvq-feqm-rueb
3
vulnerability VCID-3hfe-p6e3-tbe9
4
vulnerability VCID-49cf-c1kh-27cf
5
vulnerability VCID-5h2a-syy6-67bn
6
vulnerability VCID-71wy-ujxu-bbfj
7
vulnerability VCID-7duq-41ag-z7bk
8
vulnerability VCID-7w9w-4whw-9bgk
9
vulnerability VCID-8r7f-bt93-qqcq
10
vulnerability VCID-9a7y-2e2u-ebbf
11
vulnerability VCID-9fh6-mr57-wba8
12
vulnerability VCID-9whc-9uum-sbfq
13
vulnerability VCID-9x82-hwuz-kycf
14
vulnerability VCID-9y5c-e765-tqgt
15
vulnerability VCID-a4dr-ann4-hffe
16
vulnerability VCID-buyq-ggky-qbhh
17
vulnerability VCID-cc9y-weez-hkhu
18
vulnerability VCID-e6kf-aksq-ffbe
19
vulnerability VCID-enw3-mnnx-myd5
20
vulnerability VCID-esf1-4zw7-5fcy
21
vulnerability VCID-ethj-8jmj-5fdh
22
vulnerability VCID-fant-y91b-rubf
23
vulnerability VCID-hac2-bg9e-bfbr
24
vulnerability VCID-j63t-xqk3-p3dk
25
vulnerability VCID-j8m8-5uq3-a7a2
26
vulnerability VCID-jf9c-5due-6feb
27
vulnerability VCID-k42r-mk4h-mbbg
28
vulnerability VCID-kzje-6t7q-rudw
29
vulnerability VCID-mfty-hg4q-x7hp
30
vulnerability VCID-ngg5-bqw7-bbc4
31
vulnerability VCID-p5yv-48ry-dfe7
32
vulnerability VCID-pj45-2vrx-6fcv
33
vulnerability VCID-pyfy-88dw-9ba8
34
vulnerability VCID-qrfs-x7be-u7dx
35
vulnerability VCID-qs5z-f2ew-n7fv
36
vulnerability VCID-rm1k-u2gs-efbx
37
vulnerability VCID-t9g1-j9ej-ufcq
38
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p7-1.4
2
url pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-e9ra-cfnz-m3hg
1
vulnerability VCID-m9xh-9ac2-eycq
2
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-m9xh-9ac2-eycq
1
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-pwmy-f5qe-s3d1
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
purl pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/sudo@1.5.4-4
purl pkg:deb/debian/sudo@1.5.4-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.4-4
1
url pkg:deb/debian/sudo@1.5.6p2-2
purl pkg:deb/debian/sudo@1.5.6p2-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.6p2-2
2
url pkg:deb/debian/sudo@1.6.2p2-2.2
purl pkg:deb/debian/sudo@1.6.2p2-2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.2p2-2.2
3
url pkg:deb/debian/sudo@1.6.6-1.3
purl pkg:deb/debian/sudo@1.6.6-1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1cuy-x9m9-p3c4
1
vulnerability VCID-1s26-jrut-puf4
2
vulnerability VCID-2b4p-nehx-eyae
3
vulnerability VCID-2jvq-feqm-rueb
4
vulnerability VCID-3hfe-p6e3-tbe9
5
vulnerability VCID-49cf-c1kh-27cf
6
vulnerability VCID-5h2a-syy6-67bn
7
vulnerability VCID-71wy-ujxu-bbfj
8
vulnerability VCID-7duq-41ag-z7bk
9
vulnerability VCID-7w9w-4whw-9bgk
10
vulnerability VCID-8r7f-bt93-qqcq
11
vulnerability VCID-9a7y-2e2u-ebbf
12
vulnerability VCID-9fh6-mr57-wba8
13
vulnerability VCID-9whc-9uum-sbfq
14
vulnerability VCID-9x82-hwuz-kycf
15
vulnerability VCID-9y5c-e765-tqgt
16
vulnerability VCID-a4dr-ann4-hffe
17
vulnerability VCID-buyq-ggky-qbhh
18
vulnerability VCID-cc9y-weez-hkhu
19
vulnerability VCID-e6kf-aksq-ffbe
20
vulnerability VCID-enw3-mnnx-myd5
21
vulnerability VCID-esf1-4zw7-5fcy
22
vulnerability VCID-ethj-8jmj-5fdh
23
vulnerability VCID-fant-y91b-rubf
24
vulnerability VCID-hac2-bg9e-bfbr
25
vulnerability VCID-j63t-xqk3-p3dk
26
vulnerability VCID-j8m8-5uq3-a7a2
27
vulnerability VCID-jf9c-5due-6feb
28
vulnerability VCID-k42r-mk4h-mbbg
29
vulnerability VCID-kzje-6t7q-rudw
30
vulnerability VCID-mfty-hg4q-x7hp
31
vulnerability VCID-ngg5-bqw7-bbc4
32
vulnerability VCID-p5yv-48ry-dfe7
33
vulnerability VCID-pj45-2vrx-6fcv
34
vulnerability VCID-pyfy-88dw-9ba8
35
vulnerability VCID-qrfs-x7be-u7dx
36
vulnerability VCID-qs5z-f2ew-n7fv
37
vulnerability VCID-rm1k-u2gs-efbx
38
vulnerability VCID-t9g1-j9ej-ufcq
39
vulnerability VCID-xg63-xrvm-nkbr
40
vulnerability VCID-zd6m-f7x1-kkaa
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.6-1.3
References
0
reference_url http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
1
reference_url http://marc.info/?l=bugtraq&m=110028877431192&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110028877431192&w=2
2
reference_url http://marc.info/?l=bugtraq&m=110598298225675&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=110598298225675&w=2
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1051.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1051.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1051
reference_id
reference_type
scores
0
value 0.00274
scoring_system epss
scoring_elements 0.50907
published_at 2026-04-18T12:55:00Z
1
value 0.00274
scoring_system epss
scoring_elements 0.50765
published_at 2026-04-01T12:55:00Z
2
value 0.00274
scoring_system epss
scoring_elements 0.50821
published_at 2026-04-02T12:55:00Z
3
value 0.00274
scoring_system epss
scoring_elements 0.50847
published_at 2026-04-04T12:55:00Z
4
value 0.00274
scoring_system epss
scoring_elements 0.50804
published_at 2026-04-07T12:55:00Z
5
value 0.00274
scoring_system epss
scoring_elements 0.50861
published_at 2026-04-08T12:55:00Z
6
value 0.00274
scoring_system epss
scoring_elements 0.50859
published_at 2026-04-09T12:55:00Z
7
value 0.00274
scoring_system epss
scoring_elements 0.50901
published_at 2026-04-11T12:55:00Z
8
value 0.00274
scoring_system epss
scoring_elements 0.50879
published_at 2026-04-12T12:55:00Z
9
value 0.00274
scoring_system epss
scoring_elements 0.50863
published_at 2026-04-13T12:55:00Z
10
value 0.00274
scoring_system epss
scoring_elements 0.509
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1051
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/18055
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/18055
7
reference_url https://www.ubuntu.com/usn/usn-28-1/
reference_id
reference_type
scores
url https://www.ubuntu.com/usn/usn-28-1/
8
reference_url http://www.debian.org/security/2004/dsa-596
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-596
9
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2004:133
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2004:133
10
reference_url http://www.securityfocus.com/bid/11668
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11668
11
reference_url http://www.sudo.ws/sudo/alerts/bash_functions.html
reference_id
reference_type
scores
url http://www.sudo.ws/sudo/alerts/bash_functions.html
12
reference_url http://www.trustix.org/errata/2004/0061/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2004/0061/
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=139478
reference_id 139478
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=139478
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_id cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1051
reference_id CVE-2004-1051
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1051
Weaknesses
Exploits
Severity_range_score7.2 - 7.2
Exploitability0.5
Weighted_severity6.5
Risk_score3.2
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-1s26-jrut-puf4