{"url":"http://public2.vulnerablecode.io/api/packages/130409?format=json","purl":"pkg:rpm/redhat/cups@1:1.1.17-13.3?arch=22","type":"rpm","namespace":"redhat","name":"cups","version":"1:1.1.17-13.3","qualifiers":{"arch":"22"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89344?format=json","vulnerability_id":"VCID-d6f7-xjfh-5ygd","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1268.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1268.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1268","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28437","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28916","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28849","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28553","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28321","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28378","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28402","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28324","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28345","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28419","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1268"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1268","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1268"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18606","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18606"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10398","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10398"},{"reference_url":"http://tigger.uic.edu/~jlongs2/holes/cups2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://tigger.uic.edu/~jlongs2/holes/cups2.txt"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:008"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-013.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-013.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-053.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-053.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617401","reference_id":"1617401","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617401"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1268","reference_id":"CVE-2004-1268","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:013","reference_id":"RHSA-2005:013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:053","reference_id":"RHSA-2005:053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:053"},{"reference_url":"https://usn.ubuntu.com/50-1/","reference_id":"USN-50-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/50-1/"}],"fixed_packages":[],"aliases":["CVE-2004-1268"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d6f7-xjfh-5ygd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89346?format=json","vulnerability_id":"VCID-jcsq-esrs-zyes","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1270.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1270.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1270","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28437","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28875","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28916","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28877","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28827","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28849","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28553","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28321","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28378","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28402","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28324","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28345","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28419","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1270"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18609","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18609"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11507","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11507"},{"reference_url":"http://tigger.uic.edu/~jlongs2/holes/cups2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://tigger.uic.edu/~jlongs2/holes/cups2.txt"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:008"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-013.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-013.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-053.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-053.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617403","reference_id":"1617403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617403"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1270","reference_id":"CVE-2004-1270","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1270"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:013","reference_id":"RHSA-2005:013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:053","reference_id":"RHSA-2005:053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:053"},{"reference_url":"https://usn.ubuntu.com/50-1/","reference_id":"USN-50-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/50-1/"}],"fixed_packages":[],"aliases":["CVE-2004-1270"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jcsq-esrs-zyes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89345?format=json","vulnerability_id":"VCID-mg57-dqwb-vqee","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1269.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1269.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1269","reference_id":"","reference_type":"","scores":[{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92525","published_at":"2026-05-15T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92421","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92438","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92446","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92455","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.9246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92461","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92467","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92477","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92487","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92491","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92497","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08636","scoring_system":"epss","scoring_elements":"0.92518","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1269"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18608","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18608"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9545","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9545"},{"reference_url":"http://tigger.uic.edu/~jlongs2/holes/cups2.txt","reference_id":"","reference_type":"","scores":[],"url":"http://tigger.uic.edu/~jlongs2/holes/cups2.txt"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:008"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-013.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-013.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-053.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-053.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617402","reference_id":"1617402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617402"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1269","reference_id":"CVE-2004-1269","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1269"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/25012.c","reference_id":"CVE-2004-1269;OSVDB-12453","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/dos/25012.c"},{"reference_url":"https://www.securityfocus.com/bid/12005/info","reference_id":"CVE-2004-1269;OSVDB-12453","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/12005/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:013","reference_id":"RHSA-2005:013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:053","reference_id":"RHSA-2005:053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:053"},{"reference_url":"https://usn.ubuntu.com/50-1/","reference_id":"USN-50-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/50-1/"}],"fixed_packages":[],"aliases":["CVE-2004-1269"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mg57-dqwb-vqee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89328?format=json","vulnerability_id":"VCID-n7sa-m9h6-cqbv","summary":"security flaw","references":[{"reference_url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.foolabs.com/pub/xpdf/xpdf-3.00pl2.patch"},{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.42/SCOSA-2005.42.txt"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000921"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2004-December/030241.html"},{"reference_url":"http://marc.info/?t=110378596500001&r=1&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?t=110378596500001&r=1&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1125.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1125.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1125","reference_id":"","reference_type":"","scores":[{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91756","published_at":"2026-05-15T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.9165","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91677","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91684","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91687","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91689","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91707","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91705","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91701","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91713","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91725","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91734","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91733","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91742","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07314","scoring_system":"epss","scoring_elements":"0.91747","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1125"},{"reference_url":"https://bugzilla.fedora.us/show_bug.cgi?id=2352","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.fedora.us/show_bug.cgi?id=2352"},{"reference_url":"https://bugzilla.fedora.us/show_bug.cgi?id=2353","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.fedora.us/show_bug.cgi?id=2353"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125"},{"reference_url":"http://secunia.com/advisories/17277","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17277"},{"reference_url":"http://securitytracker.com/id?1012646","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1012646"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18641","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18641"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10830"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200501-13.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200501-17.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities"},{"reference_url":"http://www.kde.org/info/security/advisory-20041223-1.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.kde.org/info/security/advisory-20041223-1.txt"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_01_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_01_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-013.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-013.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-018.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-018.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-026.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-026.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-034.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-034.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-053.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-053.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-057.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-057.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-066.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-066.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-354.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-354.html"},{"reference_url":"http://www.securityfocus.com/bid/12070","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12070"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617371","reference_id":"1617371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617371"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xpdf:xpdf:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:kde:kde:3.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1125","reference_id":"CVE-2004-1125","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:013","reference_id":"RHSA-2005:013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:018","reference_id":"RHSA-2005:018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:026","reference_id":"RHSA-2005:026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:034","reference_id":"RHSA-2005:034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:053","reference_id":"RHSA-2005:053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:053"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:057","reference_id":"RHSA-2005:057","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:057"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:066","reference_id":"RHSA-2005:066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:354","reference_id":"RHSA-2005:354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:354"},{"reference_url":"https://usn.ubuntu.com/48-1/","reference_id":"USN-48-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/48-1/"},{"reference_url":"https://usn.ubuntu.com/50-1/","reference_id":"USN-50-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/50-1/"}],"fixed_packages":[],"aliases":["CVE-2004-1125"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7sa-m9h6-cqbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89343?format=json","vulnerability_id":"VCID-s8wg-jbst-vqc3","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1267.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1267.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1267","reference_id":"","reference_type":"","scores":[{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.96005","published_at":"2026-05-15T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.9591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95926","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.9593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95938","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95982","published_at":"2026-05-09T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95986","published_at":"2026-05-11T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.95991","published_at":"2026-05-12T12:55:00Z"},{"value":"0.23252","scoring_system":"epss","scoring_elements":"0.96003","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1267"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1267","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1267"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18604","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18604"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10620","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10620"},{"reference_url":"http://tigger.uic.edu/~jlongs2/holes/cups.txt","reference_id":"","reference_type":"","scores":[],"url":"http://tigger.uic.edu/~jlongs2/holes/cups.txt"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:008","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:008"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-013.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-013.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-053.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-053.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617400","reference_id":"1617400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617400"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1267","reference_id":"CVE-2004-1267","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1267"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24977.txt","reference_id":"CVE-2004-1267;OSVDB-12439","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24977.txt"},{"reference_url":"https://www.securityfocus.com/bid/11968/info","reference_id":"CVE-2004-1267;OSVDB-12439","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/11968/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:013","reference_id":"RHSA-2005:013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:053","reference_id":"RHSA-2005:053","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:053"},{"reference_url":"https://usn.ubuntu.com/50-1/","reference_id":"USN-50-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/50-1/"}],"fixed_packages":[],"aliases":["CVE-2004-1267"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s8wg-jbst-vqc3"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cups@1:1.1.17-13.3%3Farch=22"}