Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
Typedeb
Namespacedebian
Namecondor
Version23.9.6+dfsg-2.1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version25.7.2+dfsg-1
Latest_non_vulnerable_version25.7.2+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-153e-ka9n-eydy
vulnerability_id VCID-153e-ka9n-eydy
summary An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45102
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56802
published_at 2026-04-01T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56896
published_at 2026-04-02T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56917
published_at 2026-04-21T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.56894
published_at 2026-04-07T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56945
published_at 2026-04-08T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.56949
published_at 2026-04-09T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56957
published_at 2026-04-11T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56937
published_at 2026-04-12T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56914
published_at 2026-04-13T12:55:00Z
9
value 0.00342
scoring_system epss
scoring_elements 0.56942
published_at 2026-04-16T12:55:00Z
10
value 0.00342
scoring_system epss
scoring_elements 0.56939
published_at 2026-04-18T12:55:00Z
11
value 0.00342
scoring_system epss
scoring_elements 0.56856
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45102
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-45102
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-153e-ka9n-eydy
1
url VCID-1q6e-935y-puh5
vulnerability_id VCID-1q6e-935y-puh5
summary HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25312
reference_id
reference_type
scores
0
value 0.00463
scoring_system epss
scoring_elements 0.64159
published_at 2026-04-01T12:55:00Z
1
value 0.00463
scoring_system epss
scoring_elements 0.64216
published_at 2026-04-02T12:55:00Z
2
value 0.00463
scoring_system epss
scoring_elements 0.64244
published_at 2026-04-04T12:55:00Z
3
value 0.00463
scoring_system epss
scoring_elements 0.64205
published_at 2026-04-07T12:55:00Z
4
value 0.00463
scoring_system epss
scoring_elements 0.64255
published_at 2026-04-08T12:55:00Z
5
value 0.00463
scoring_system epss
scoring_elements 0.6427
published_at 2026-04-09T12:55:00Z
6
value 0.00463
scoring_system epss
scoring_elements 0.64283
published_at 2026-04-11T12:55:00Z
7
value 0.00463
scoring_system epss
scoring_elements 0.64272
published_at 2026-04-12T12:55:00Z
8
value 0.00463
scoring_system epss
scoring_elements 0.64245
published_at 2026-04-13T12:55:00Z
9
value 0.00463
scoring_system epss
scoring_elements 0.64279
published_at 2026-04-21T12:55:00Z
10
value 0.00463
scoring_system epss
scoring_elements 0.6429
published_at 2026-04-18T12:55:00Z
11
value 0.00463
scoring_system epss
scoring_elements 0.64299
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25312
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-25312
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1q6e-935y-puh5
2
url VCID-2h9v-ygzk-subd
vulnerability_id VCID-2h9v-ygzk-subd
summary condor: GIVE_REQUEST_AD leaks privileged ClaimId information
references
0
reference_url http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972
reference_id
reference_type
scores
url http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972
1
reference_url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
2
reference_url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2012-1278.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1278.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1281.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1281.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3493
reference_id
reference_type
scores
0
value 0.00765
scoring_system epss
scoring_elements 0.73515
published_at 2026-04-24T12:55:00Z
1
value 0.00765
scoring_system epss
scoring_elements 0.73387
published_at 2026-04-01T12:55:00Z
2
value 0.00765
scoring_system epss
scoring_elements 0.73395
published_at 2026-04-02T12:55:00Z
3
value 0.00765
scoring_system epss
scoring_elements 0.73418
published_at 2026-04-04T12:55:00Z
4
value 0.00765
scoring_system epss
scoring_elements 0.73391
published_at 2026-04-07T12:55:00Z
5
value 0.00765
scoring_system epss
scoring_elements 0.73428
published_at 2026-04-08T12:55:00Z
6
value 0.00765
scoring_system epss
scoring_elements 0.73441
published_at 2026-04-09T12:55:00Z
7
value 0.00765
scoring_system epss
scoring_elements 0.73465
published_at 2026-04-11T12:55:00Z
8
value 0.00765
scoring_system epss
scoring_elements 0.73445
published_at 2026-04-12T12:55:00Z
9
value 0.00765
scoring_system epss
scoring_elements 0.73437
published_at 2026-04-13T12:55:00Z
10
value 0.00765
scoring_system epss
scoring_elements 0.73479
published_at 2026-04-16T12:55:00Z
11
value 0.00765
scoring_system epss
scoring_elements 0.73488
published_at 2026-04-18T12:55:00Z
12
value 0.00765
scoring_system epss
scoring_elements 0.73482
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3493
7
reference_url http://secunia.com/advisories/50666
reference_id
reference_type
scores
url http://secunia.com/advisories/50666
8
reference_url http://www.openwall.com/lists/oss-security/2012/09/20/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/20/9
9
reference_url http://www.securityfocus.com/bid/55632
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55632
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210
reference_id 688210
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=848222
reference_id 848222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=848222
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3493
reference_id CVE-2012-3493
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3493
27
reference_url https://access.redhat.com/errata/RHSA-2012:1278
reference_id RHSA-2012:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1278
28
reference_url https://access.redhat.com/errata/RHSA-2012:1281
reference_id RHSA-2012:1281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1281
fixed_packages
0
url pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-3493
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2h9v-ygzk-subd
3
url VCID-2jbn-3er7-jub7
vulnerability_id VCID-2jbn-3er7-jub7
summary HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30093
reference_id
reference_type
scores
0
value 0.00199
scoring_system epss
scoring_elements 0.41936
published_at 2026-04-24T12:55:00Z
1
value 0.00199
scoring_system epss
scoring_elements 0.41996
published_at 2026-04-21T12:55:00Z
2
value 0.00199
scoring_system epss
scoring_elements 0.42052
published_at 2026-04-02T12:55:00Z
3
value 0.00199
scoring_system epss
scoring_elements 0.4208
published_at 2026-04-04T12:55:00Z
4
value 0.00199
scoring_system epss
scoring_elements 0.42018
published_at 2026-04-07T12:55:00Z
5
value 0.00199
scoring_system epss
scoring_elements 0.4207
published_at 2026-04-08T12:55:00Z
6
value 0.00199
scoring_system epss
scoring_elements 0.42082
published_at 2026-04-09T12:55:00Z
7
value 0.00199
scoring_system epss
scoring_elements 0.42104
published_at 2026-04-11T12:55:00Z
8
value 0.00199
scoring_system epss
scoring_elements 0.42066
published_at 2026-04-18T12:55:00Z
9
value 0.00199
scoring_system epss
scoring_elements 0.42041
published_at 2026-04-13T12:55:00Z
10
value 0.00199
scoring_system epss
scoring_elements 0.42092
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30093
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101498
reference_id 1101498
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101498
2
reference_url https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html
reference_id HTCONDOR-2025-0001.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:18:26Z/
url https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html
fixed_packages
0
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2025-30093
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jbn-3er7-jub7
4
url VCID-8k4z-8t2z-a3ew
vulnerability_id VCID-8k4z-8t2z-a3ew
summary HTCondor Access Point before 25.3.1 allows an authenticated user to impersonate other users on the local machine by submitting a batch job. This is fixed in 24.12.14, 25.0.3, and 25.3.1. The earliest affected version is 24.7.3.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-66433
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.0539
published_at 2026-04-24T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05352
published_at 2026-04-21T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05204
published_at 2026-04-02T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05233
published_at 2026-04-04T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05257
published_at 2026-04-07T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05292
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05313
published_at 2026-04-09T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05278
published_at 2026-04-11T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05263
published_at 2026-04-12T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.0525
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05195
published_at 2026-04-16T12:55:00Z
11
value 0.0002
scoring_system epss
scoring_elements 0.05197
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-66433
1
reference_url https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html
reference_id HTCONDOR-2025-0002.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T13:33:56Z/
url https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2025-66433
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-8t2z-a3ew
5
url VCID-9ury-14he-1qbg
vulnerability_id VCID-9ury-14he-1qbg
summary condor: users can run jobs with arbitrary owners
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3826
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22753
published_at 2026-04-24T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.22893
published_at 2026-04-01T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23063
published_at 2026-04-02T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23108
published_at 2026-04-04T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22899
published_at 2026-04-07T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22971
published_at 2026-04-08T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23024
published_at 2026-04-09T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23043
published_at 2026-04-11T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23006
published_at 2026-04-12T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.2295
published_at 2026-04-13T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.22966
published_at 2026-04-16T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.22959
published_at 2026-04-18T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.22923
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3826
2
reference_url http://secunia.com/advisories/32189
reference_id
reference_type
scores
url http://secunia.com/advisories/32189
3
reference_url http://secunia.com/advisories/32193
reference_id
reference_type
scores
url http://secunia.com/advisories/32193
4
reference_url http://secunia.com/advisories/32232
reference_id
reference_type
scores
url http://secunia.com/advisories/32232
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
6
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
7
reference_url http://www.redhat.com/support/errata/RHSA-2008-0911.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0911.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0924.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0924.html
9
reference_url http://www.securityfocus.com/bid/31621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31621
10
reference_url http://www.securitytracker.com/id?1021002
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021002
11
reference_url http://www.vupen.com/english/advisories/2008/2760
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2760
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463987
reference_id 463987
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463987
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3826
reference_id CVE-2008-3826
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3826
29
reference_url https://access.redhat.com/errata/RHSA-2008:0911
reference_id RHSA-2008:0911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0911
30
reference_url https://access.redhat.com/errata/RHSA-2008:0924
reference_id RHSA-2008:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0924
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3826
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ury-14he-1qbg
6
url VCID-b6rd-kvqr-93gr
vulnerability_id VCID-b6rd-kvqr-93gr
summary condor: local users can abort any idle jobs
references
0
reference_url http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40
reference_id
reference_type
scores
url http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40
1
reference_url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
2
reference_url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2012-1278.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1278.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1281.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1281.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3491
reference_id
reference_type
scores
0
value 0.0112
scoring_system epss
scoring_elements 0.78298
published_at 2026-04-24T12:55:00Z
1
value 0.0112
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-01T12:55:00Z
2
value 0.0112
scoring_system epss
scoring_elements 0.78189
published_at 2026-04-02T12:55:00Z
3
value 0.0112
scoring_system epss
scoring_elements 0.78219
published_at 2026-04-04T12:55:00Z
4
value 0.0112
scoring_system epss
scoring_elements 0.78202
published_at 2026-04-07T12:55:00Z
5
value 0.0112
scoring_system epss
scoring_elements 0.78228
published_at 2026-04-08T12:55:00Z
6
value 0.0112
scoring_system epss
scoring_elements 0.78234
published_at 2026-04-09T12:55:00Z
7
value 0.0112
scoring_system epss
scoring_elements 0.7826
published_at 2026-04-11T12:55:00Z
8
value 0.0112
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-12T12:55:00Z
9
value 0.0112
scoring_system epss
scoring_elements 0.78239
published_at 2026-04-13T12:55:00Z
10
value 0.0112
scoring_system epss
scoring_elements 0.7827
published_at 2026-04-16T12:55:00Z
11
value 0.0112
scoring_system epss
scoring_elements 0.78268
published_at 2026-04-18T12:55:00Z
12
value 0.0112
scoring_system epss
scoring_elements 0.78265
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3491
7
reference_url http://secunia.com/advisories/50666
reference_id
reference_type
scores
url http://secunia.com/advisories/50666
8
reference_url http://www.openwall.com/lists/oss-security/2012/09/20/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/20/9
9
reference_url http://www.securityfocus.com/bid/55632
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55632
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210
reference_id 688210
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=848214
reference_id 848214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=848214
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3491
reference_id CVE-2012-3491
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3491
27
reference_url https://access.redhat.com/errata/RHSA-2012:1278
reference_id RHSA-2012:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1278
28
reference_url https://access.redhat.com/errata/RHSA-2012:1281
reference_id RHSA-2012:1281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1281
fixed_packages
0
url pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-3491
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b6rd-kvqr-93gr
7
url VCID-e7tr-c4vp-aqc4
vulnerability_id VCID-e7tr-c4vp-aqc4
summary condor: multiple buffer overflows
references
0
reference_url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
1
reference_url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5196
reference_id
reference_type
scores
0
value 0.0078
scoring_system epss
scoring_elements 0.73758
published_at 2026-04-24T12:55:00Z
1
value 0.0078
scoring_system epss
scoring_elements 0.73631
published_at 2026-04-01T12:55:00Z
2
value 0.0078
scoring_system epss
scoring_elements 0.73641
published_at 2026-04-02T12:55:00Z
3
value 0.0078
scoring_system epss
scoring_elements 0.73665
published_at 2026-04-04T12:55:00Z
4
value 0.0078
scoring_system epss
scoring_elements 0.73638
published_at 2026-04-07T12:55:00Z
5
value 0.0078
scoring_system epss
scoring_elements 0.73673
published_at 2026-04-08T12:55:00Z
6
value 0.0078
scoring_system epss
scoring_elements 0.73686
published_at 2026-04-09T12:55:00Z
7
value 0.0078
scoring_system epss
scoring_elements 0.73708
published_at 2026-04-11T12:55:00Z
8
value 0.0078
scoring_system epss
scoring_elements 0.7369
published_at 2026-04-12T12:55:00Z
9
value 0.0078
scoring_system epss
scoring_elements 0.73681
published_at 2026-04-13T12:55:00Z
10
value 0.0078
scoring_system epss
scoring_elements 0.73724
published_at 2026-04-16T12:55:00Z
11
value 0.0078
scoring_system epss
scoring_elements 0.73733
published_at 2026-04-18T12:55:00Z
12
value 0.0078
scoring_system epss
scoring_elements 0.73725
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5196
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78975
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78975
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=869786
reference_id 869786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=869786
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5196
reference_id CVE-2012-5196
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5196
fixed_packages
0
url pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-5196
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e7tr-c4vp-aqc4
8
url VCID-ee1r-3kks-8uen
vulnerability_id VCID-ee1r-3kks-8uen
summary Condor: queue super user cannot drop privs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4133
reference_id
reference_type
scores
0
value 0.01434
scoring_system epss
scoring_elements 0.80624
published_at 2026-04-01T12:55:00Z
1
value 0.01434
scoring_system epss
scoring_elements 0.80632
published_at 2026-04-02T12:55:00Z
2
value 0.01434
scoring_system epss
scoring_elements 0.80654
published_at 2026-04-04T12:55:00Z
3
value 0.01434
scoring_system epss
scoring_elements 0.80649
published_at 2026-04-07T12:55:00Z
4
value 0.01434
scoring_system epss
scoring_elements 0.80677
published_at 2026-04-08T12:55:00Z
5
value 0.01434
scoring_system epss
scoring_elements 0.80687
published_at 2026-04-09T12:55:00Z
6
value 0.01434
scoring_system epss
scoring_elements 0.80703
published_at 2026-04-11T12:55:00Z
7
value 0.01434
scoring_system epss
scoring_elements 0.8069
published_at 2026-04-12T12:55:00Z
8
value 0.01434
scoring_system epss
scoring_elements 0.80681
published_at 2026-04-13T12:55:00Z
9
value 0.01434
scoring_system epss
scoring_elements 0.80716
published_at 2026-04-18T12:55:00Z
10
value 0.01434
scoring_system epss
scoring_elements 0.80719
published_at 2026-04-21T12:55:00Z
11
value 0.01434
scoring_system epss
scoring_elements 0.80742
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4133
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=544371
reference_id 544371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=544371
3
reference_url https://access.redhat.com/errata/RHSA-2009:1688
reference_id RHSA-2009:1688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1688
4
reference_url https://access.redhat.com/errata/RHSA-2009:1689
reference_id RHSA-2009:1689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1689
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-4133
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ee1r-3kks-8uen
9
url VCID-fdhn-w5fd-zuem
vulnerability_id VCID-fdhn-w5fd-zuem
summary condor: allow or deny with overlapping netmasks may be ignored
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3830
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17841
published_at 2026-04-24T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17959
published_at 2026-04-01T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18119
published_at 2026-04-02T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-04T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17871
published_at 2026-04-07T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17958
published_at 2026-04-08T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.18019
published_at 2026-04-09T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.18035
published_at 2026-04-11T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.1799
published_at 2026-04-12T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.1794
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17884
published_at 2026-04-16T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17894
published_at 2026-04-18T12:55:00Z
12
value 0.00057
scoring_system epss
scoring_elements 0.17931
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3830
2
reference_url http://secunia.com/advisories/32189
reference_id
reference_type
scores
url http://secunia.com/advisories/32189
3
reference_url http://secunia.com/advisories/32193
reference_id
reference_type
scores
url http://secunia.com/advisories/32193
4
reference_url http://secunia.com/advisories/32232
reference_id
reference_type
scores
url http://secunia.com/advisories/32232
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
6
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
7
reference_url http://www.redhat.com/support/errata/RHSA-2008-0911.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0911.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0924.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0924.html
9
reference_url http://www.securityfocus.com/bid/31621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31621
10
reference_url http://www.securitytracker.com/id?1021002
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021002
11
reference_url http://www.vupen.com/english/advisories/2008/2760
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2760
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463997
reference_id 463997
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463997
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3830
reference_id CVE-2008-3830
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3830
29
reference_url https://access.redhat.com/errata/RHSA-2008:0911
reference_id RHSA-2008:0911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0911
30
reference_url https://access.redhat.com/errata/RHSA-2008:0924
reference_id RHSA-2008:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0924
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3830
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fdhn-w5fd-zuem
10
url VCID-g86f-7ywp-sya5
vulnerability_id VCID-g86f-7ywp-sya5
summary condor: incorrect handling of wild cards in authorization lists
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3424
reference_id
reference_type
scores
0
value 0.00646
scoring_system epss
scoring_elements 0.70801
published_at 2026-04-24T12:55:00Z
1
value 0.00646
scoring_system epss
scoring_elements 0.70655
published_at 2026-04-01T12:55:00Z
2
value 0.00646
scoring_system epss
scoring_elements 0.7067
published_at 2026-04-02T12:55:00Z
3
value 0.00646
scoring_system epss
scoring_elements 0.70689
published_at 2026-04-04T12:55:00Z
4
value 0.00646
scoring_system epss
scoring_elements 0.70667
published_at 2026-04-07T12:55:00Z
5
value 0.00646
scoring_system epss
scoring_elements 0.70712
published_at 2026-04-08T12:55:00Z
6
value 0.00646
scoring_system epss
scoring_elements 0.70728
published_at 2026-04-09T12:55:00Z
7
value 0.00646
scoring_system epss
scoring_elements 0.7075
published_at 2026-04-11T12:55:00Z
8
value 0.00646
scoring_system epss
scoring_elements 0.70734
published_at 2026-04-12T12:55:00Z
9
value 0.00646
scoring_system epss
scoring_elements 0.70718
published_at 2026-04-13T12:55:00Z
10
value 0.00646
scoring_system epss
scoring_elements 0.70763
published_at 2026-04-16T12:55:00Z
11
value 0.00646
scoring_system epss
scoring_elements 0.7077
published_at 2026-04-18T12:55:00Z
12
value 0.00646
scoring_system epss
scoring_elements 0.70748
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3424
2
reference_url http://secunia.com/advisories/31284
reference_id
reference_type
scores
url http://secunia.com/advisories/31284
3
reference_url http://secunia.com/advisories/31423
reference_id
reference_type
scores
url http://secunia.com/advisories/31423
4
reference_url http://secunia.com/advisories/31459
reference_id
reference_type
scores
url http://secunia.com/advisories/31459
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44063
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44063
6
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html
7
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0814.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0814.html
9
reference_url http://www.redhat.com/support/errata/RHSA-2008-0816.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0816.html
10
reference_url http://www.securityfocus.com/bid/30440
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30440
11
reference_url http://www.securitytracker.com/id?1020646
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020646
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=457372
reference_id 457372
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=457372
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3424
reference_id CVE-2008-3424
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3424
16
reference_url https://access.redhat.com/errata/RHSA-2008:0814
reference_id RHSA-2008:0814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0814
17
reference_url https://access.redhat.com/errata/RHSA-2008:0816
reference_id RHSA-2008:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0816
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3424
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g86f-7ywp-sya5
11
url VCID-gb62-cbpn-5fbe
vulnerability_id VCID-gb62-cbpn-5fbe
summary condor: lock directories created mode 0777 allow for FS-based authentication challenge bypass
references
0
reference_url http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805
reference_id
reference_type
scores
url http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805
1
reference_url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
2
reference_url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2012-1278.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1278.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1281.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1281.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3492
reference_id
reference_type
scores
0
value 0.00698
scoring_system epss
scoring_elements 0.7202
published_at 2026-04-24T12:55:00Z
1
value 0.00698
scoring_system epss
scoring_elements 0.71903
published_at 2026-04-01T12:55:00Z
2
value 0.00698
scoring_system epss
scoring_elements 0.7191
published_at 2026-04-02T12:55:00Z
3
value 0.00698
scoring_system epss
scoring_elements 0.71929
published_at 2026-04-04T12:55:00Z
4
value 0.00698
scoring_system epss
scoring_elements 0.71906
published_at 2026-04-07T12:55:00Z
5
value 0.00698
scoring_system epss
scoring_elements 0.71944
published_at 2026-04-08T12:55:00Z
6
value 0.00698
scoring_system epss
scoring_elements 0.71956
published_at 2026-04-09T12:55:00Z
7
value 0.00698
scoring_system epss
scoring_elements 0.7198
published_at 2026-04-11T12:55:00Z
8
value 0.00698
scoring_system epss
scoring_elements 0.71963
published_at 2026-04-12T12:55:00Z
9
value 0.00698
scoring_system epss
scoring_elements 0.71945
published_at 2026-04-13T12:55:00Z
10
value 0.00698
scoring_system epss
scoring_elements 0.71986
published_at 2026-04-16T12:55:00Z
11
value 0.00698
scoring_system epss
scoring_elements 0.7199
published_at 2026-04-18T12:55:00Z
12
value 0.00698
scoring_system epss
scoring_elements 0.71976
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3492
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492
8
reference_url http://secunia.com/advisories/50666
reference_id
reference_type
scores
url http://secunia.com/advisories/50666
9
reference_url http://www.openwall.com/lists/oss-security/2012/09/20/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/20/9
10
reference_url http://www.securityfocus.com/bid/55632
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55632
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210
reference_id 688210
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=848218
reference_id 848218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=848218
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3492
reference_id CVE-2012-3492
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3492
28
reference_url https://access.redhat.com/errata/RHSA-2012:1278
reference_id RHSA-2012:1278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1278
29
reference_url https://access.redhat.com/errata/RHSA-2012:1281
reference_id RHSA-2012:1281
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1281
fixed_packages
0
url pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-3492
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gb62-cbpn-5fbe
12
url VCID-jftp-4vmf-dyg1
vulnerability_id VCID-jftp-4vmf-dyg1
summary condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25311
reference_id
reference_type
scores
0
value 0.02768
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-01T12:55:00Z
1
value 0.02768
scoring_system epss
scoring_elements 0.85979
published_at 2026-04-02T12:55:00Z
2
value 0.02768
scoring_system epss
scoring_elements 0.85995
published_at 2026-04-04T12:55:00Z
3
value 0.02768
scoring_system epss
scoring_elements 0.85994
published_at 2026-04-07T12:55:00Z
4
value 0.02768
scoring_system epss
scoring_elements 0.86014
published_at 2026-04-08T12:55:00Z
5
value 0.02768
scoring_system epss
scoring_elements 0.86023
published_at 2026-04-09T12:55:00Z
6
value 0.02768
scoring_system epss
scoring_elements 0.86038
published_at 2026-04-11T12:55:00Z
7
value 0.02768
scoring_system epss
scoring_elements 0.86036
published_at 2026-04-12T12:55:00Z
8
value 0.02768
scoring_system epss
scoring_elements 0.86031
published_at 2026-04-13T12:55:00Z
9
value 0.02768
scoring_system epss
scoring_elements 0.86049
published_at 2026-04-16T12:55:00Z
10
value 0.02768
scoring_system epss
scoring_elements 0.86054
published_at 2026-04-18T12:55:00Z
11
value 0.02768
scoring_system epss
scoring_elements 0.86046
published_at 2026-04-21T12:55:00Z
12
value 0.02768
scoring_system epss
scoring_elements 0.86066
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25311
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-25311
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jftp-4vmf-dyg1
13
url VCID-kvba-wgcs-xbd7
vulnerability_id VCID-kvba-wgcs-xbd7
summary condor: denial of service attack on Schedd via corrupt logfile
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3829
reference_id
reference_type
scores
0
value 0.01076
scoring_system epss
scoring_elements 0.77861
published_at 2026-04-24T12:55:00Z
1
value 0.01076
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-01T12:55:00Z
2
value 0.01076
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-02T12:55:00Z
3
value 0.01076
scoring_system epss
scoring_elements 0.77773
published_at 2026-04-04T12:55:00Z
4
value 0.01076
scoring_system epss
scoring_elements 0.77757
published_at 2026-04-07T12:55:00Z
5
value 0.01076
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-08T12:55:00Z
6
value 0.01076
scoring_system epss
scoring_elements 0.7779
published_at 2026-04-09T12:55:00Z
7
value 0.01076
scoring_system epss
scoring_elements 0.77816
published_at 2026-04-11T12:55:00Z
8
value 0.01076
scoring_system epss
scoring_elements 0.778
published_at 2026-04-13T12:55:00Z
9
value 0.01076
scoring_system epss
scoring_elements 0.77836
published_at 2026-04-16T12:55:00Z
10
value 0.01076
scoring_system epss
scoring_elements 0.77835
published_at 2026-04-18T12:55:00Z
11
value 0.01076
scoring_system epss
scoring_elements 0.77829
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3829
2
reference_url http://secunia.com/advisories/32189
reference_id
reference_type
scores
url http://secunia.com/advisories/32189
3
reference_url http://secunia.com/advisories/32193
reference_id
reference_type
scores
url http://secunia.com/advisories/32193
4
reference_url http://secunia.com/advisories/32232
reference_id
reference_type
scores
url http://secunia.com/advisories/32232
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
6
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
7
reference_url http://www.redhat.com/support/errata/RHSA-2008-0911.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0911.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0924.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0924.html
9
reference_url http://www.securityfocus.com/bid/31621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31621
10
reference_url http://www.securitytracker.com/id?1021002
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021002
11
reference_url http://www.vupen.com/english/advisories/2008/2760
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2760
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463995
reference_id 463995
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463995
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3829
reference_id CVE-2008-3829
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3829
29
reference_url https://access.redhat.com/errata/RHSA-2008:0911
reference_id RHSA-2008:0911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0911
30
reference_url https://access.redhat.com/errata/RHSA-2008:0924
reference_id RHSA-2008:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0924
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3829
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kvba-wgcs-xbd7
14
url VCID-n74d-yydh-43bh
vulnerability_id VCID-n74d-yydh-43bh
summary condor: host based authentication does not implement forward-confirmed reverse dns
references
0
reference_url http://osvdb.org/84766
reference_id
reference_type
scores
url http://osvdb.org/84766
1
reference_url http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2012-1168.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1168.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2012-1169.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1169.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3416.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3416.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3416
reference_id
reference_type
scores
0
value 0.01876
scoring_system epss
scoring_elements 0.83187
published_at 2026-04-24T12:55:00Z
1
value 0.01876
scoring_system epss
scoring_elements 0.83056
published_at 2026-04-01T12:55:00Z
2
value 0.01876
scoring_system epss
scoring_elements 0.83073
published_at 2026-04-02T12:55:00Z
3
value 0.01876
scoring_system epss
scoring_elements 0.83086
published_at 2026-04-04T12:55:00Z
4
value 0.01876
scoring_system epss
scoring_elements 0.83085
published_at 2026-04-07T12:55:00Z
5
value 0.01876
scoring_system epss
scoring_elements 0.8311
published_at 2026-04-08T12:55:00Z
6
value 0.01876
scoring_system epss
scoring_elements 0.83117
published_at 2026-04-09T12:55:00Z
7
value 0.01876
scoring_system epss
scoring_elements 0.83134
published_at 2026-04-11T12:55:00Z
8
value 0.01876
scoring_system epss
scoring_elements 0.83128
published_at 2026-04-12T12:55:00Z
9
value 0.01876
scoring_system epss
scoring_elements 0.83123
published_at 2026-04-13T12:55:00Z
10
value 0.01876
scoring_system epss
scoring_elements 0.83161
published_at 2026-04-18T12:55:00Z
11
value 0.01876
scoring_system epss
scoring_elements 0.83164
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3416
6
reference_url http://secunia.com/advisories/50246
reference_id
reference_type
scores
url http://secunia.com/advisories/50246
7
reference_url http://secunia.com/advisories/50294
reference_id
reference_type
scores
url http://secunia.com/advisories/50294
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
9
reference_url http://www.securityfocus.com/bid/55032
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55032
10
reference_url http://www.securitytracker.com/id?1027395
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1027395
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685366
reference_id 685366
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685366
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=841175
reference_id 841175
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=841175
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3416
reference_id CVE-2012-3416
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3416
53
reference_url https://access.redhat.com/errata/RHSA-2012:1168
reference_id RHSA-2012:1168
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1168
54
reference_url https://access.redhat.com/errata/RHSA-2012:1169
reference_id RHSA-2012:1169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1169
fixed_packages
0
url pkg:deb/debian/condor@7.8.2~dfsg.1-1?distro=trixie
purl pkg:deb/debian/condor@7.8.2~dfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-3416
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n74d-yydh-43bh
15
url VCID-nkcc-sjac-dkcn
vulnerability_id VCID-nkcc-sjac-dkcn
summary Condor: Multiple format string flaws
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4930
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27076
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27116
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27152
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26944
published_at 2026-04-18T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27013
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27058
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27061
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27017
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.2696
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.2697
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.2691
published_at 2026-04-21T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26862
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4930
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=759548
reference_id 759548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=759548
3
reference_url https://access.redhat.com/errata/RHSA-2012:0099
reference_id RHSA-2012:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0099
4
reference_url https://access.redhat.com/errata/RHSA-2012:0100
reference_id RHSA-2012:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0100
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-4930
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkcc-sjac-dkcn
16
url VCID-q7ww-nrcw-zkcn
vulnerability_id VCID-q7ww-nrcw-zkcn
summary An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45104
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.3035
published_at 2026-04-01T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.3038
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30426
published_at 2026-04-04T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30239
published_at 2026-04-07T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30299
published_at 2026-04-08T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30334
published_at 2026-04-09T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30338
published_at 2026-04-11T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30294
published_at 2026-04-12T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30245
published_at 2026-04-13T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.3026
published_at 2026-04-16T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30242
published_at 2026-04-18T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30197
published_at 2026-04-21T12:55:00Z
12
value 0.00116
scoring_system epss
scoring_elements 0.30133
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45104
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-45104
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q7ww-nrcw-zkcn
17
url VCID-qjt1-vej1-kfav
vulnerability_id VCID-qjt1-vej1-kfav
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8126.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8126.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8126
reference_id
reference_type
scores
0
value 0.01199
scoring_system epss
scoring_elements 0.78949
published_at 2026-04-24T12:55:00Z
1
value 0.01451
scoring_system epss
scoring_elements 0.80737
published_at 2026-04-02T12:55:00Z
2
value 0.01451
scoring_system epss
scoring_elements 0.80758
published_at 2026-04-04T12:55:00Z
3
value 0.01451
scoring_system epss
scoring_elements 0.80755
published_at 2026-04-07T12:55:00Z
4
value 0.01451
scoring_system epss
scoring_elements 0.80783
published_at 2026-04-08T12:55:00Z
5
value 0.01451
scoring_system epss
scoring_elements 0.80791
published_at 2026-04-09T12:55:00Z
6
value 0.01451
scoring_system epss
scoring_elements 0.80728
published_at 2026-04-01T12:55:00Z
7
value 0.01451
scoring_system epss
scoring_elements 0.80792
published_at 2026-04-12T12:55:00Z
8
value 0.01451
scoring_system epss
scoring_elements 0.80784
published_at 2026-04-13T12:55:00Z
9
value 0.01451
scoring_system epss
scoring_elements 0.80821
published_at 2026-04-16T12:55:00Z
10
value 0.01451
scoring_system epss
scoring_elements 0.80824
published_at 2026-04-18T12:55:00Z
11
value 0.01451
scoring_system epss
scoring_elements 0.80825
published_at 2026-04-21T12:55:00Z
12
value 0.01451
scoring_system epss
scoring_elements 0.80807
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8126
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8126
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1169800
reference_id 1169800
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1169800
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775276
reference_id 775276
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775276
5
reference_url https://access.redhat.com/errata/RHSA-2015:0035
reference_id RHSA-2015:0035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0035
6
reference_url https://access.redhat.com/errata/RHSA-2015:0036
reference_id RHSA-2015:0036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0036
7
reference_url https://usn.ubuntu.com/USN-4771-1/
reference_id USN-USN-4771-1
reference_type
scores
url https://usn.ubuntu.com/USN-4771-1/
fixed_packages
0
url pkg:deb/debian/condor@8.2.3~dfsg.1-6?distro=trixie
purl pkg:deb/debian/condor@8.2.3~dfsg.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.2.3~dfsg.1-6%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2014-8126
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qjt1-vej1-kfav
18
url VCID-s6t4-5qp1-fyd8
vulnerability_id VCID-s6t4-5qp1-fyd8
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26110
reference_id
reference_type
scores
0
value 0.00447
scoring_system epss
scoring_elements 0.63458
published_at 2026-04-02T12:55:00Z
1
value 0.00447
scoring_system epss
scoring_elements 0.63485
published_at 2026-04-13T12:55:00Z
2
value 0.00447
scoring_system epss
scoring_elements 0.6345
published_at 2026-04-07T12:55:00Z
3
value 0.00447
scoring_system epss
scoring_elements 0.63501
published_at 2026-04-08T12:55:00Z
4
value 0.00447
scoring_system epss
scoring_elements 0.63518
published_at 2026-04-09T12:55:00Z
5
value 0.00447
scoring_system epss
scoring_elements 0.63535
published_at 2026-04-11T12:55:00Z
6
value 0.00447
scoring_system epss
scoring_elements 0.6352
published_at 2026-04-12T12:55:00Z
7
value 0.00447
scoring_system epss
scoring_elements 0.63521
published_at 2026-04-16T12:55:00Z
8
value 0.00447
scoring_system epss
scoring_elements 0.63528
published_at 2026-04-18T12:55:00Z
9
value 0.00447
scoring_system epss
scoring_elements 0.63514
published_at 2026-04-21T12:55:00Z
10
value 0.00447
scoring_system epss
scoring_elements 0.63532
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26110
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008634
reference_id 1008634
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008634
fixed_packages
0
url pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2022-26110
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s6t4-5qp1-fyd8
19
url VCID-s7bg-ynpu-gqem
vulnerability_id VCID-s7bg-ynpu-gqem
summary security update
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-18823
reference_id
reference_type
scores
0
value 0.02816
scoring_system epss
scoring_elements 0.86079
published_at 2026-04-01T12:55:00Z
1
value 0.02816
scoring_system epss
scoring_elements 0.86089
published_at 2026-04-02T12:55:00Z
2
value 0.02816
scoring_system epss
scoring_elements 0.86105
published_at 2026-04-07T12:55:00Z
3
value 0.02816
scoring_system epss
scoring_elements 0.86123
published_at 2026-04-08T12:55:00Z
4
value 0.02816
scoring_system epss
scoring_elements 0.86135
published_at 2026-04-09T12:55:00Z
5
value 0.02816
scoring_system epss
scoring_elements 0.86149
published_at 2026-04-11T12:55:00Z
6
value 0.02816
scoring_system epss
scoring_elements 0.86148
published_at 2026-04-12T12:55:00Z
7
value 0.02816
scoring_system epss
scoring_elements 0.86144
published_at 2026-04-13T12:55:00Z
8
value 0.02816
scoring_system epss
scoring_elements 0.86161
published_at 2026-04-16T12:55:00Z
9
value 0.02816
scoring_system epss
scoring_elements 0.86167
published_at 2026-04-18T12:55:00Z
10
value 0.02816
scoring_system epss
scoring_elements 0.86158
published_at 2026-04-21T12:55:00Z
11
value 0.02816
scoring_system epss
scoring_elements 0.86179
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-18823
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963777
reference_id 963777
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963777
fixed_packages
0
url pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2019-18823
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s7bg-ynpu-gqem
20
url VCID-ssr1-n586-aba6
vulnerability_id VCID-ssr1-n586-aba6
summary An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45101
reference_id
reference_type
scores
0
value 0.00364
scoring_system epss
scoring_elements 0.58321
published_at 2026-04-01T12:55:00Z
1
value 0.00364
scoring_system epss
scoring_elements 0.58407
published_at 2026-04-02T12:55:00Z
2
value 0.00364
scoring_system epss
scoring_elements 0.58426
published_at 2026-04-04T12:55:00Z
3
value 0.00364
scoring_system epss
scoring_elements 0.584
published_at 2026-04-07T12:55:00Z
4
value 0.00364
scoring_system epss
scoring_elements 0.58453
published_at 2026-04-08T12:55:00Z
5
value 0.00364
scoring_system epss
scoring_elements 0.58459
published_at 2026-04-09T12:55:00Z
6
value 0.00364
scoring_system epss
scoring_elements 0.58477
published_at 2026-04-11T12:55:00Z
7
value 0.00364
scoring_system epss
scoring_elements 0.58457
published_at 2026-04-12T12:55:00Z
8
value 0.00364
scoring_system epss
scoring_elements 0.58438
published_at 2026-04-13T12:55:00Z
9
value 0.00364
scoring_system epss
scoring_elements 0.5847
published_at 2026-04-16T12:55:00Z
10
value 0.00364
scoring_system epss
scoring_elements 0.58475
published_at 2026-04-18T12:55:00Z
11
value 0.00364
scoring_system epss
scoring_elements 0.58452
published_at 2026-04-21T12:55:00Z
12
value 0.00364
scoring_system epss
scoring_elements 0.58413
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45101
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002540
reference_id 1002540
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002540
fixed_packages
0
url pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-45101
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ssr1-n586-aba6
21
url VCID-t7ft-uyts-kbgc
vulnerability_id VCID-t7ft-uyts-kbgc
summary condor: privilege escalation via jobs submitted to the standard universe (CONDOR-2012-0003)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5390
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83054
published_at 2026-04-01T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.8307
published_at 2026-04-02T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83084
published_at 2026-04-04T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83082
published_at 2026-04-07T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83107
published_at 2026-04-08T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83114
published_at 2026-04-09T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.8313
published_at 2026-04-11T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83124
published_at 2026-04-12T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.8312
published_at 2026-04-13T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83161
published_at 2026-04-21T12:55:00Z
11
value 0.01874
scoring_system epss
scoring_elements 0.83184
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5390
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=894481
reference_id 894481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=894481
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-5390
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7ft-uyts-kbgc
22
url VCID-t9j5-gkyc-gbhw
vulnerability_id VCID-t9j5-gkyc-gbhw
summary condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0564.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0564.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0565.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0565.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4462
reference_id
reference_type
scores
0
value 0.00686
scoring_system epss
scoring_elements 0.71777
published_at 2026-04-24T12:55:00Z
1
value 0.00686
scoring_system epss
scoring_elements 0.71659
published_at 2026-04-01T12:55:00Z
2
value 0.00686
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-02T12:55:00Z
3
value 0.00686
scoring_system epss
scoring_elements 0.71683
published_at 2026-04-04T12:55:00Z
4
value 0.00686
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-07T12:55:00Z
5
value 0.00686
scoring_system epss
scoring_elements 0.71696
published_at 2026-04-13T12:55:00Z
6
value 0.00686
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-09T12:55:00Z
7
value 0.00686
scoring_system epss
scoring_elements 0.7173
published_at 2026-04-11T12:55:00Z
8
value 0.00686
scoring_system epss
scoring_elements 0.71714
published_at 2026-04-12T12:55:00Z
9
value 0.00686
scoring_system epss
scoring_elements 0.7174
published_at 2026-04-16T12:55:00Z
10
value 0.00686
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-18T12:55:00Z
11
value 0.00686
scoring_system epss
scoring_elements 0.71728
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4462
4
reference_url https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
reference_id
reference_type
scores
url https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=860850
reference_id 860850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=860850
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4462
reference_id CVE-2012-4462
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4462
9
reference_url https://access.redhat.com/errata/RHSA-2013:0564
reference_id RHSA-2013:0564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0564
10
reference_url https://access.redhat.com/errata/RHSA-2013:0565
reference_id RHSA-2013:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0565
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-4462
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw
23
url VCID-un61-qbgx-tfbz
vulnerability_id VCID-un61-qbgx-tfbz
summary condor: DoS of condor_schedd via specially crafted VOMS proxy
references
0
reference_url http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16816.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16816.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-16816
reference_id
reference_type
scores
0
value 0.00637
scoring_system epss
scoring_elements 0.70402
published_at 2026-04-01T12:55:00Z
1
value 0.00637
scoring_system epss
scoring_elements 0.70548
published_at 2026-04-24T12:55:00Z
2
value 0.00637
scoring_system epss
scoring_elements 0.7051
published_at 2026-04-16T12:55:00Z
3
value 0.00637
scoring_system epss
scoring_elements 0.70518
published_at 2026-04-18T12:55:00Z
4
value 0.00637
scoring_system epss
scoring_elements 0.70416
published_at 2026-04-02T12:55:00Z
5
value 0.00637
scoring_system epss
scoring_elements 0.70433
published_at 2026-04-04T12:55:00Z
6
value 0.00637
scoring_system epss
scoring_elements 0.70412
published_at 2026-04-07T12:55:00Z
7
value 0.00637
scoring_system epss
scoring_elements 0.70457
published_at 2026-04-08T12:55:00Z
8
value 0.00637
scoring_system epss
scoring_elements 0.70473
published_at 2026-04-09T12:55:00Z
9
value 0.00637
scoring_system epss
scoring_elements 0.70497
published_at 2026-04-21T12:55:00Z
10
value 0.00637
scoring_system epss
scoring_elements 0.70482
published_at 2026-04-12T12:55:00Z
11
value 0.00637
scoring_system epss
scoring_elements 0.70467
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-16816
3
reference_url https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml
reference_id
reference_type
scores
url https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1508887
reference_id 1508887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1508887
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-16816
reference_id CVE-2017-16816
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-16816
7
reference_url https://usn.ubuntu.com/USN-4771-1/
reference_id USN-USN-4771-1
reference_type
scores
url https://usn.ubuntu.com/USN-4771-1/
fixed_packages
0
url pkg:deb/debian/condor@8.6.8~dfsg.1-1?distro=trixie
purl pkg:deb/debian/condor@8.6.8~dfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.6.8~dfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2017-16816
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un61-qbgx-tfbz
24
url VCID-w4bg-xh3m-8qcb
vulnerability_id VCID-w4bg-xh3m-8qcb
summary The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-5136
reference_id
reference_type
scores
0
value 0.00625
scoring_system epss
scoring_elements 0.70108
published_at 2026-04-01T12:55:00Z
1
value 0.00625
scoring_system epss
scoring_elements 0.7012
published_at 2026-04-02T12:55:00Z
2
value 0.00625
scoring_system epss
scoring_elements 0.70135
published_at 2026-04-04T12:55:00Z
3
value 0.00625
scoring_system epss
scoring_elements 0.70112
published_at 2026-04-07T12:55:00Z
4
value 0.00625
scoring_system epss
scoring_elements 0.70159
published_at 2026-04-08T12:55:00Z
5
value 0.00625
scoring_system epss
scoring_elements 0.70175
published_at 2026-04-09T12:55:00Z
6
value 0.00625
scoring_system epss
scoring_elements 0.70199
published_at 2026-04-11T12:55:00Z
7
value 0.00625
scoring_system epss
scoring_elements 0.70184
published_at 2026-04-12T12:55:00Z
8
value 0.00625
scoring_system epss
scoring_elements 0.70172
published_at 2026-04-13T12:55:00Z
9
value 0.00625
scoring_system epss
scoring_elements 0.70214
published_at 2026-04-16T12:55:00Z
10
value 0.00625
scoring_system epss
scoring_elements 0.70223
published_at 2026-04-18T12:55:00Z
11
value 0.00625
scoring_system epss
scoring_elements 0.70202
published_at 2026-04-21T12:55:00Z
12
value 0.00625
scoring_system epss
scoring_elements 0.70254
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-5136
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-5136
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w4bg-xh3m-8qcb
25
url VCID-wxq1-xdb2-2ba7
vulnerability_id VCID-wxq1-xdb2-2ba7
summary condor: multiple unspecified vulnerabilities (likely a duplicate of CVE-2012-3490)
references
0
reference_url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html
1
reference_url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
reference_id
reference_type
scores
url http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5197
reference_id
reference_type
scores
0
value 0.00723
scoring_system epss
scoring_elements 0.72617
published_at 2026-04-24T12:55:00Z
1
value 0.00723
scoring_system epss
scoring_elements 0.72485
published_at 2026-04-07T12:55:00Z
2
value 0.00723
scoring_system epss
scoring_elements 0.72492
published_at 2026-04-02T12:55:00Z
3
value 0.00723
scoring_system epss
scoring_elements 0.72508
published_at 2026-04-04T12:55:00Z
4
value 0.00723
scoring_system epss
scoring_elements 0.72524
published_at 2026-04-08T12:55:00Z
5
value 0.00723
scoring_system epss
scoring_elements 0.72536
published_at 2026-04-09T12:55:00Z
6
value 0.00723
scoring_system epss
scoring_elements 0.7256
published_at 2026-04-11T12:55:00Z
7
value 0.00723
scoring_system epss
scoring_elements 0.72542
published_at 2026-04-12T12:55:00Z
8
value 0.00723
scoring_system epss
scoring_elements 0.72533
published_at 2026-04-13T12:55:00Z
9
value 0.00723
scoring_system epss
scoring_elements 0.72575
published_at 2026-04-21T12:55:00Z
10
value 0.00723
scoring_system epss
scoring_elements 0.72585
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5197
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/78974
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/78974
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=869803
reference_id 869803
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=869803
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-5197
reference_id CVE-2012-5197
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-5197
fixed_packages
0
url pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-5197
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wxq1-xdb2-2ba7
26
url VCID-x9xb-pzmk-zuch
vulnerability_id VCID-x9xb-pzmk-zuch
summary condor: buffer overflow in lookup_macro
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3828
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43846
published_at 2026-04-24T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.4389
published_at 2026-04-01T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43935
published_at 2026-04-02T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-04T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43887
published_at 2026-04-07T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43938
published_at 2026-04-08T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.4394
published_at 2026-04-09T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43958
published_at 2026-04-11T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43925
published_at 2026-04-12T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.4391
published_at 2026-04-13T12:55:00Z
10
value 0.00214
scoring_system epss
scoring_elements 0.43972
published_at 2026-04-16T12:55:00Z
11
value 0.00214
scoring_system epss
scoring_elements 0.43963
published_at 2026-04-18T12:55:00Z
12
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3828
2
reference_url http://secunia.com/advisories/32189
reference_id
reference_type
scores
url http://secunia.com/advisories/32189
3
reference_url http://secunia.com/advisories/32193
reference_id
reference_type
scores
url http://secunia.com/advisories/32193
4
reference_url http://secunia.com/advisories/32232
reference_id
reference_type
scores
url http://secunia.com/advisories/32232
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
6
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
7
reference_url http://www.redhat.com/support/errata/RHSA-2008-0911.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0911.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0924.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0924.html
9
reference_url http://www.securityfocus.com/bid/31621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31621
10
reference_url http://www.securitytracker.com/id?1021002
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021002
11
reference_url http://www.vupen.com/english/advisories/2008/2760
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2760
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463990
reference_id 463990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463990
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3828
reference_id CVE-2008-3828
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3828
29
reference_url https://access.redhat.com/errata/RHSA-2008:0911
reference_id RHSA-2008:0911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0911
30
reference_url https://access.redhat.com/errata/RHSA-2008:0924
reference_id RHSA-2008:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0924
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3828
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x9xb-pzmk-zuch
27
url VCID-xka1-grec-tfa4
vulnerability_id VCID-xka1-grec-tfa4
summary condor: does not check return value of setuid and similar calls, exploitable via VMware support
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3490
reference_id
reference_type
scores
0
value 0.01859
scoring_system epss
scoring_elements 0.83078
published_at 2026-04-18T12:55:00Z
1
value 0.01859
scoring_system epss
scoring_elements 0.83081
published_at 2026-04-21T12:55:00Z
2
value 0.01956
scoring_system epss
scoring_elements 0.83447
published_at 2026-04-04T12:55:00Z
3
value 0.01956
scoring_system epss
scoring_elements 0.83446
published_at 2026-04-07T12:55:00Z
4
value 0.01956
scoring_system epss
scoring_elements 0.8347
published_at 2026-04-08T12:55:00Z
5
value 0.01956
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-09T12:55:00Z
6
value 0.01956
scoring_system epss
scoring_elements 0.83494
published_at 2026-04-11T12:55:00Z
7
value 0.01956
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-12T12:55:00Z
8
value 0.01956
scoring_system epss
scoring_elements 0.83484
published_at 2026-04-13T12:55:00Z
9
value 0.01956
scoring_system epss
scoring_elements 0.83419
published_at 2026-04-01T12:55:00Z
10
value 0.01956
scoring_system epss
scoring_elements 0.83432
published_at 2026-04-02T12:55:00Z
11
value 0.02073
scoring_system epss
scoring_elements 0.84005
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3490
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210
reference_id 688210
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=848212
reference_id 848212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=848212
fixed_packages
0
url pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
purl pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-3490
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xka1-grec-tfa4
28
url VCID-y6dj-4ap5-5ycb
vulnerability_id VCID-y6dj-4ap5-5ycb
summary condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4255.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4255.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4255
reference_id
reference_type
scores
0
value 0.00707
scoring_system epss
scoring_elements 0.72125
published_at 2026-04-01T12:55:00Z
1
value 0.00707
scoring_system epss
scoring_elements 0.72131
published_at 2026-04-02T12:55:00Z
2
value 0.00707
scoring_system epss
scoring_elements 0.72151
published_at 2026-04-04T12:55:00Z
3
value 0.00707
scoring_system epss
scoring_elements 0.72129
published_at 2026-04-07T12:55:00Z
4
value 0.00707
scoring_system epss
scoring_elements 0.72165
published_at 2026-04-08T12:55:00Z
5
value 0.00707
scoring_system epss
scoring_elements 0.72177
published_at 2026-04-09T12:55:00Z
6
value 0.00707
scoring_system epss
scoring_elements 0.722
published_at 2026-04-11T12:55:00Z
7
value 0.00707
scoring_system epss
scoring_elements 0.72184
published_at 2026-04-12T12:55:00Z
8
value 0.00707
scoring_system epss
scoring_elements 0.7217
published_at 2026-04-13T12:55:00Z
9
value 0.00707
scoring_system epss
scoring_elements 0.72211
published_at 2026-04-16T12:55:00Z
10
value 0.00707
scoring_system epss
scoring_elements 0.7222
published_at 2026-04-18T12:55:00Z
11
value 0.00707
scoring_system epss
scoring_elements 0.72206
published_at 2026-04-21T12:55:00Z
12
value 0.00707
scoring_system epss
scoring_elements 0.72249
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4255
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721693
reference_id 721693
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721693
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=919401
reference_id 919401
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=919401
4
reference_url https://access.redhat.com/errata/RHSA-2013:1171
reference_id RHSA-2013:1171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1171
5
reference_url https://access.redhat.com/errata/RHSA-2013:1172
reference_id RHSA-2013:1172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1172
fixed_packages
0
url pkg:deb/debian/condor@8.0.5~dfsg.1-1?distro=trixie
purl pkg:deb/debian/condor@8.0.5~dfsg.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.0.5~dfsg.1-1%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2013-4255
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y6dj-4ap5-5ycb
29
url VCID-ztyg-r17a-mkfu
vulnerability_id VCID-ztyg-r17a-mkfu
summary An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45103
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51517
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51569
published_at 2026-04-02T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51595
published_at 2026-04-04T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51556
published_at 2026-04-07T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.5161
published_at 2026-04-08T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51606
published_at 2026-04-09T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51656
published_at 2026-04-11T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51634
published_at 2026-04-12T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51618
published_at 2026-04-13T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51659
published_at 2026-04-16T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51666
published_at 2026-04-18T12:55:00Z
11
value 0.00282
scoring_system epss
scoring_elements 0.51646
published_at 2026-04-21T12:55:00Z
12
value 0.00282
scoring_system epss
scoring_elements 0.51597
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45103
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-45103
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyg-r17a-mkfu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie