{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89368?format=json","vulnerability_id":"VCID-1s26-jrut-puf4","summary":"CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)","aliases":[{"alias":"CVE-2004-1051"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/940178?format=json","purl":"pkg:deb/debian/sudo@1.6.8p3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/572133?format=json","purl":"pkg:deb/debian/sudo@1.6.8p7-1.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-2b4p-nehx-eyae"},{"vulnerability":"VCID-2jvq-feqm-rueb"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-49cf-c1kh-27cf"},{"vulnerability":"VCID-5h2a-syy6-67bn"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7duq-41ag-z7bk"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9whc-9uum-sbfq"},{"vulnerability":"VCID-9x82-hwuz-kycf"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-a4dr-ann4-hffe"},{"vulnerability":"VCID-buyq-ggky-qbhh"},{"vulnerability":"VCID-cc9y-weez-hkhu"},{"vulnerability":"VCID-e6kf-aksq-ffbe"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-fant-y91b-rubf"},{"vulnerability":"VCID-hac2-bg9e-bfbr"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-j8m8-5uq3-a7a2"},{"vulnerability":"VCID-jf9c-5due-6feb"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-mfty-hg4q-x7hp"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-qrfs-x7be-u7dx"},{"vulnerability":"VCID-qs5z-f2ew-n7fv"},{"vulnerability":"VCID-rm1k-u2gs-efbx"},{"vulnerability":"VCID-t9g1-j9ej-ufcq"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.8p7-1.4"},{"url":"http://public2.vulnerablecode.io/api/packages/940179?format=json","purl":"pkg:deb/debian/sudo@1.9.5p2-3%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-e9ra-cfnz-m3hg"},{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.5p2-3%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940177?format=json","purl":"pkg:deb/debian/sudo@1.9.13p3-1%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-m9xh-9ac2-eycq"},{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.13p3-1%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940181?format=json","purl":"pkg:deb/debian/sudo@1.9.16p2-3%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-pwmy-f5qe-s3d1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.16p2-3%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940180?format=json","purl":"pkg:deb/debian/sudo@1.9.17p2-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.9.17p2-5%3Fdistro=trixie"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572129?format=json","purl":"pkg:deb/debian/sudo@1.5.4-4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-1s26-jrut-puf4"},{"vulnerability":"VCID-2b4p-nehx-eyae"},{"vulnerability":"VCID-2jvq-feqm-rueb"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-49cf-c1kh-27cf"},{"vulnerability":"VCID-5h2a-syy6-67bn"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7duq-41ag-z7bk"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9whc-9uum-sbfq"},{"vulnerability":"VCID-9x82-hwuz-kycf"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-a4dr-ann4-hffe"},{"vulnerability":"VCID-buyq-ggky-qbhh"},{"vulnerability":"VCID-cc9y-weez-hkhu"},{"vulnerability":"VCID-e6kf-aksq-ffbe"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-fant-y91b-rubf"},{"vulnerability":"VCID-hac2-bg9e-bfbr"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-j8m8-5uq3-a7a2"},{"vulnerability":"VCID-jf9c-5due-6feb"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-mfty-hg4q-x7hp"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-qrfs-x7be-u7dx"},{"vulnerability":"VCID-qs5z-f2ew-n7fv"},{"vulnerability":"VCID-rm1k-u2gs-efbx"},{"vulnerability":"VCID-t9g1-j9ej-ufcq"},{"vulnerability":"VCID-xg63-xrvm-nkbr"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.4-4"},{"url":"http://public2.vulnerablecode.io/api/packages/572130?format=json","purl":"pkg:deb/debian/sudo@1.5.6p2-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-1s26-jrut-puf4"},{"vulnerability":"VCID-2b4p-nehx-eyae"},{"vulnerability":"VCID-2jvq-feqm-rueb"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-49cf-c1kh-27cf"},{"vulnerability":"VCID-5h2a-syy6-67bn"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7duq-41ag-z7bk"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9whc-9uum-sbfq"},{"vulnerability":"VCID-9x82-hwuz-kycf"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-a4dr-ann4-hffe"},{"vulnerability":"VCID-buyq-ggky-qbhh"},{"vulnerability":"VCID-cc9y-weez-hkhu"},{"vulnerability":"VCID-e6kf-aksq-ffbe"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-fant-y91b-rubf"},{"vulnerability":"VCID-hac2-bg9e-bfbr"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-j8m8-5uq3-a7a2"},{"vulnerability":"VCID-jf9c-5due-6feb"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-mfty-hg4q-x7hp"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-qrfs-x7be-u7dx"},{"vulnerability":"VCID-qs5z-f2ew-n7fv"},{"vulnerability":"VCID-rm1k-u2gs-efbx"},{"vulnerability":"VCID-t9g1-j9ej-ufcq"},{"vulnerability":"VCID-xg63-xrvm-nkbr"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.5.6p2-2"},{"url":"http://public2.vulnerablecode.io/api/packages/572131?format=json","purl":"pkg:deb/debian/sudo@1.6.2p2-2.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-1s26-jrut-puf4"},{"vulnerability":"VCID-2b4p-nehx-eyae"},{"vulnerability":"VCID-2jvq-feqm-rueb"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-49cf-c1kh-27cf"},{"vulnerability":"VCID-5h2a-syy6-67bn"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7duq-41ag-z7bk"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9whc-9uum-sbfq"},{"vulnerability":"VCID-9x82-hwuz-kycf"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-a4dr-ann4-hffe"},{"vulnerability":"VCID-buyq-ggky-qbhh"},{"vulnerability":"VCID-cc9y-weez-hkhu"},{"vulnerability":"VCID-e6kf-aksq-ffbe"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-fant-y91b-rubf"},{"vulnerability":"VCID-hac2-bg9e-bfbr"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-j8m8-5uq3-a7a2"},{"vulnerability":"VCID-jf9c-5due-6feb"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-mfty-hg4q-x7hp"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-qrfs-x7be-u7dx"},{"vulnerability":"VCID-qs5z-f2ew-n7fv"},{"vulnerability":"VCID-rm1k-u2gs-efbx"},{"vulnerability":"VCID-t9g1-j9ej-ufcq"},{"vulnerability":"VCID-xg63-xrvm-nkbr"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.2p2-2.2"},{"url":"http://public2.vulnerablecode.io/api/packages/572132?format=json","purl":"pkg:deb/debian/sudo@1.6.6-1.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1cuy-x9m9-p3c4"},{"vulnerability":"VCID-1s26-jrut-puf4"},{"vulnerability":"VCID-2b4p-nehx-eyae"},{"vulnerability":"VCID-2jvq-feqm-rueb"},{"vulnerability":"VCID-3hfe-p6e3-tbe9"},{"vulnerability":"VCID-49cf-c1kh-27cf"},{"vulnerability":"VCID-5h2a-syy6-67bn"},{"vulnerability":"VCID-71wy-ujxu-bbfj"},{"vulnerability":"VCID-7duq-41ag-z7bk"},{"vulnerability":"VCID-7w9w-4whw-9bgk"},{"vulnerability":"VCID-8r7f-bt93-qqcq"},{"vulnerability":"VCID-9a7y-2e2u-ebbf"},{"vulnerability":"VCID-9fh6-mr57-wba8"},{"vulnerability":"VCID-9whc-9uum-sbfq"},{"vulnerability":"VCID-9x82-hwuz-kycf"},{"vulnerability":"VCID-9y5c-e765-tqgt"},{"vulnerability":"VCID-a4dr-ann4-hffe"},{"vulnerability":"VCID-buyq-ggky-qbhh"},{"vulnerability":"VCID-cc9y-weez-hkhu"},{"vulnerability":"VCID-e6kf-aksq-ffbe"},{"vulnerability":"VCID-enw3-mnnx-myd5"},{"vulnerability":"VCID-esf1-4zw7-5fcy"},{"vulnerability":"VCID-ethj-8jmj-5fdh"},{"vulnerability":"VCID-fant-y91b-rubf"},{"vulnerability":"VCID-hac2-bg9e-bfbr"},{"vulnerability":"VCID-j63t-xqk3-p3dk"},{"vulnerability":"VCID-j8m8-5uq3-a7a2"},{"vulnerability":"VCID-jf9c-5due-6feb"},{"vulnerability":"VCID-k42r-mk4h-mbbg"},{"vulnerability":"VCID-kzje-6t7q-rudw"},{"vulnerability":"VCID-mfty-hg4q-x7hp"},{"vulnerability":"VCID-ngg5-bqw7-bbc4"},{"vulnerability":"VCID-p5yv-48ry-dfe7"},{"vulnerability":"VCID-pj45-2vrx-6fcv"},{"vulnerability":"VCID-pyfy-88dw-9ba8"},{"vulnerability":"VCID-qrfs-x7be-u7dx"},{"vulnerability":"VCID-qs5z-f2ew-n7fv"},{"vulnerability":"VCID-rm1k-u2gs-efbx"},{"vulnerability":"VCID-t9g1-j9ej-ufcq"},{"vulnerability":"VCID-xg63-xrvm-nkbr"},{"vulnerability":"VCID-zd6m-f7x1-kkaa"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/sudo@1.6.6-1.3"}],"references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2005/May/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2005/May/msg00001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=110028877431192&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110028877431192&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=110598298225675&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110598298225675&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1051.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1051","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50887","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50765","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50821","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50861","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.509","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50835","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50844","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50728","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50781","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50812","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50766","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50798","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50875","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18055","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18055"},{"reference_url":"https://www.ubuntu.com/usn/usn-28-1/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ubuntu.com/usn/usn-28-1/"},{"reference_url":"http://www.debian.org/security/2004/dsa-596","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-596"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:133","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2004:133"},{"reference_url":"http://www.securityfocus.com/bid/11668","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11668"},{"reference_url":"http://www.sudo.ws/sudo/alerts/bash_functions.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sudo.ws/sudo/alerts/bash_functions.html"},{"reference_url":"http://www.trustix.org/errata/2004/0061/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2004/0061/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=139478","reference_id":"139478","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=139478"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_id":"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1051","reference_id":"CVE-2004-1051","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1051"}],"weaknesses":[],"exploits":[],"severity_range_score":"7.2 - 7.2","exploitability":"0.5","weighted_severity":"6.5","risk_score":3.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1s26-jrut-puf4"}