Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/condor@0?distro=trixie
Typedeb
Namespacedebian
Namecondor
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.8.2~dfsg.1-1
Latest_non_vulnerable_version25.7.2+dfsg-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-153e-ka9n-eydy
vulnerability_id VCID-153e-ka9n-eydy
summary An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45102
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56802
published_at 2026-04-01T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56896
published_at 2026-04-02T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56917
published_at 2026-04-21T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.56894
published_at 2026-04-07T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56945
published_at 2026-04-08T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.56949
published_at 2026-04-09T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56957
published_at 2026-04-11T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56937
published_at 2026-04-12T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56914
published_at 2026-04-13T12:55:00Z
9
value 0.00342
scoring_system epss
scoring_elements 0.56942
published_at 2026-04-16T12:55:00Z
10
value 0.00342
scoring_system epss
scoring_elements 0.56939
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45102
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-45102
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-153e-ka9n-eydy
1
url VCID-1q6e-935y-puh5
vulnerability_id VCID-1q6e-935y-puh5
summary HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25312
reference_id
reference_type
scores
0
value 0.00463
scoring_system epss
scoring_elements 0.64159
published_at 2026-04-01T12:55:00Z
1
value 0.00463
scoring_system epss
scoring_elements 0.64216
published_at 2026-04-02T12:55:00Z
2
value 0.00463
scoring_system epss
scoring_elements 0.64244
published_at 2026-04-04T12:55:00Z
3
value 0.00463
scoring_system epss
scoring_elements 0.64205
published_at 2026-04-07T12:55:00Z
4
value 0.00463
scoring_system epss
scoring_elements 0.64255
published_at 2026-04-08T12:55:00Z
5
value 0.00463
scoring_system epss
scoring_elements 0.6427
published_at 2026-04-09T12:55:00Z
6
value 0.00463
scoring_system epss
scoring_elements 0.64283
published_at 2026-04-11T12:55:00Z
7
value 0.00463
scoring_system epss
scoring_elements 0.64272
published_at 2026-04-12T12:55:00Z
8
value 0.00463
scoring_system epss
scoring_elements 0.64245
published_at 2026-04-13T12:55:00Z
9
value 0.00463
scoring_system epss
scoring_elements 0.64279
published_at 2026-04-21T12:55:00Z
10
value 0.00463
scoring_system epss
scoring_elements 0.6429
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25312
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-25312
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1q6e-935y-puh5
2
url VCID-8k4z-8t2z-a3ew
vulnerability_id VCID-8k4z-8t2z-a3ew
summary HTCondor Access Point before 25.3.1 allows an authenticated user to impersonate other users on the local machine by submitting a batch job. This is fixed in 24.12.14, 25.0.3, and 25.3.1. The earliest affected version is 24.7.3.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-66433
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05352
published_at 2026-04-21T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05197
published_at 2026-04-18T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05204
published_at 2026-04-02T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05233
published_at 2026-04-04T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05257
published_at 2026-04-07T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05292
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05313
published_at 2026-04-09T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05278
published_at 2026-04-11T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05263
published_at 2026-04-12T12:55:00Z
9
value 0.0002
scoring_system epss
scoring_elements 0.0525
published_at 2026-04-13T12:55:00Z
10
value 0.0002
scoring_system epss
scoring_elements 0.05195
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-66433
1
reference_url https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html
reference_id HTCONDOR-2025-0002.html
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T13:33:56Z/
url https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2025-66433
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-8t2z-a3ew
3
url VCID-9ury-14he-1qbg
vulnerability_id VCID-9ury-14he-1qbg
summary condor: users can run jobs with arbitrary owners
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3826
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.22923
published_at 2026-04-21T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.22893
published_at 2026-04-01T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23063
published_at 2026-04-02T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23108
published_at 2026-04-04T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.22899
published_at 2026-04-07T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.22971
published_at 2026-04-08T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23024
published_at 2026-04-09T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23043
published_at 2026-04-11T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23006
published_at 2026-04-12T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.2295
published_at 2026-04-13T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.22966
published_at 2026-04-16T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.22959
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3826
2
reference_url http://secunia.com/advisories/32189
reference_id
reference_type
scores
url http://secunia.com/advisories/32189
3
reference_url http://secunia.com/advisories/32193
reference_id
reference_type
scores
url http://secunia.com/advisories/32193
4
reference_url http://secunia.com/advisories/32232
reference_id
reference_type
scores
url http://secunia.com/advisories/32232
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
6
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
7
reference_url http://www.redhat.com/support/errata/RHSA-2008-0911.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0911.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0924.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0924.html
9
reference_url http://www.securityfocus.com/bid/31621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31621
10
reference_url http://www.securitytracker.com/id?1021002
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021002
11
reference_url http://www.vupen.com/english/advisories/2008/2760
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2760
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463987
reference_id 463987
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463987
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3826
reference_id CVE-2008-3826
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3826
29
reference_url https://access.redhat.com/errata/RHSA-2008:0911
reference_id RHSA-2008:0911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0911
30
reference_url https://access.redhat.com/errata/RHSA-2008:0924
reference_id RHSA-2008:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0924
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3826
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ury-14he-1qbg
4
url VCID-ee1r-3kks-8uen
vulnerability_id VCID-ee1r-3kks-8uen
summary Condor: queue super user cannot drop privs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-4133
reference_id
reference_type
scores
0
value 0.01434
scoring_system epss
scoring_elements 0.80624
published_at 2026-04-01T12:55:00Z
1
value 0.01434
scoring_system epss
scoring_elements 0.80632
published_at 2026-04-02T12:55:00Z
2
value 0.01434
scoring_system epss
scoring_elements 0.80654
published_at 2026-04-04T12:55:00Z
3
value 0.01434
scoring_system epss
scoring_elements 0.80649
published_at 2026-04-07T12:55:00Z
4
value 0.01434
scoring_system epss
scoring_elements 0.80677
published_at 2026-04-08T12:55:00Z
5
value 0.01434
scoring_system epss
scoring_elements 0.80687
published_at 2026-04-09T12:55:00Z
6
value 0.01434
scoring_system epss
scoring_elements 0.80703
published_at 2026-04-11T12:55:00Z
7
value 0.01434
scoring_system epss
scoring_elements 0.8069
published_at 2026-04-12T12:55:00Z
8
value 0.01434
scoring_system epss
scoring_elements 0.80681
published_at 2026-04-13T12:55:00Z
9
value 0.01434
scoring_system epss
scoring_elements 0.80716
published_at 2026-04-18T12:55:00Z
10
value 0.01434
scoring_system epss
scoring_elements 0.80719
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-4133
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=544371
reference_id 544371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=544371
3
reference_url https://access.redhat.com/errata/RHSA-2009:1688
reference_id RHSA-2009:1688
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1688
4
reference_url https://access.redhat.com/errata/RHSA-2009:1689
reference_id RHSA-2009:1689
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1689
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-4133
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ee1r-3kks-8uen
5
url VCID-fdhn-w5fd-zuem
vulnerability_id VCID-fdhn-w5fd-zuem
summary condor: allow or deny with overlapping netmasks may be ignored
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3830
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17931
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.17959
published_at 2026-04-01T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18119
published_at 2026-04-02T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.18172
published_at 2026-04-04T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17871
published_at 2026-04-07T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17958
published_at 2026-04-08T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.18019
published_at 2026-04-09T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.18035
published_at 2026-04-11T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.1799
published_at 2026-04-12T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.1794
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17884
published_at 2026-04-16T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17894
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3830
2
reference_url http://secunia.com/advisories/32189
reference_id
reference_type
scores
url http://secunia.com/advisories/32189
3
reference_url http://secunia.com/advisories/32193
reference_id
reference_type
scores
url http://secunia.com/advisories/32193
4
reference_url http://secunia.com/advisories/32232
reference_id
reference_type
scores
url http://secunia.com/advisories/32232
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
6
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
7
reference_url http://www.redhat.com/support/errata/RHSA-2008-0911.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0911.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0924.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0924.html
9
reference_url http://www.securityfocus.com/bid/31621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31621
10
reference_url http://www.securitytracker.com/id?1021002
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021002
11
reference_url http://www.vupen.com/english/advisories/2008/2760
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2760
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463997
reference_id 463997
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463997
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3830
reference_id CVE-2008-3830
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-3830
29
reference_url https://access.redhat.com/errata/RHSA-2008:0911
reference_id RHSA-2008:0911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0911
30
reference_url https://access.redhat.com/errata/RHSA-2008:0924
reference_id RHSA-2008:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0924
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3830
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fdhn-w5fd-zuem
6
url VCID-g86f-7ywp-sya5
vulnerability_id VCID-g86f-7ywp-sya5
summary condor: incorrect handling of wild cards in authorization lists
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3424
reference_id
reference_type
scores
0
value 0.00646
scoring_system epss
scoring_elements 0.70748
published_at 2026-04-21T12:55:00Z
1
value 0.00646
scoring_system epss
scoring_elements 0.70655
published_at 2026-04-01T12:55:00Z
2
value 0.00646
scoring_system epss
scoring_elements 0.7067
published_at 2026-04-02T12:55:00Z
3
value 0.00646
scoring_system epss
scoring_elements 0.70689
published_at 2026-04-04T12:55:00Z
4
value 0.00646
scoring_system epss
scoring_elements 0.70667
published_at 2026-04-07T12:55:00Z
5
value 0.00646
scoring_system epss
scoring_elements 0.70712
published_at 2026-04-08T12:55:00Z
6
value 0.00646
scoring_system epss
scoring_elements 0.70728
published_at 2026-04-09T12:55:00Z
7
value 0.00646
scoring_system epss
scoring_elements 0.7075
published_at 2026-04-11T12:55:00Z
8
value 0.00646
scoring_system epss
scoring_elements 0.70734
published_at 2026-04-12T12:55:00Z
9
value 0.00646
scoring_system epss
scoring_elements 0.70718
published_at 2026-04-13T12:55:00Z
10
value 0.00646
scoring_system epss
scoring_elements 0.70763
published_at 2026-04-16T12:55:00Z
11
value 0.00646
scoring_system epss
scoring_elements 0.7077
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3424
2
reference_url http://secunia.com/advisories/31284
reference_id
reference_type
scores
url http://secunia.com/advisories/31284
3
reference_url http://secunia.com/advisories/31423
reference_id
reference_type
scores
url http://secunia.com/advisories/31423
4
reference_url http://secunia.com/advisories/31459
reference_id
reference_type
scores
url http://secunia.com/advisories/31459
5
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44063
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44063
6
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html
7
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0814.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0814.html
9
reference_url http://www.redhat.com/support/errata/RHSA-2008-0816.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0816.html
10
reference_url http://www.securityfocus.com/bid/30440
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/30440
11
reference_url http://www.securitytracker.com/id?1020646
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1020646
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=457372
reference_id 457372
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=457372
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3424
reference_id CVE-2008-3424
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3424
16
reference_url https://access.redhat.com/errata/RHSA-2008:0814
reference_id RHSA-2008:0814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0814
17
reference_url https://access.redhat.com/errata/RHSA-2008:0816
reference_id RHSA-2008:0816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0816
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3424
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g86f-7ywp-sya5
7
url VCID-jftp-4vmf-dyg1
vulnerability_id VCID-jftp-4vmf-dyg1
summary condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25311
reference_id
reference_type
scores
0
value 0.02768
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-01T12:55:00Z
1
value 0.02768
scoring_system epss
scoring_elements 0.85979
published_at 2026-04-02T12:55:00Z
2
value 0.02768
scoring_system epss
scoring_elements 0.85995
published_at 2026-04-04T12:55:00Z
3
value 0.02768
scoring_system epss
scoring_elements 0.85994
published_at 2026-04-07T12:55:00Z
4
value 0.02768
scoring_system epss
scoring_elements 0.86014
published_at 2026-04-08T12:55:00Z
5
value 0.02768
scoring_system epss
scoring_elements 0.86023
published_at 2026-04-09T12:55:00Z
6
value 0.02768
scoring_system epss
scoring_elements 0.86038
published_at 2026-04-11T12:55:00Z
7
value 0.02768
scoring_system epss
scoring_elements 0.86036
published_at 2026-04-12T12:55:00Z
8
value 0.02768
scoring_system epss
scoring_elements 0.86031
published_at 2026-04-13T12:55:00Z
9
value 0.02768
scoring_system epss
scoring_elements 0.86049
published_at 2026-04-16T12:55:00Z
10
value 0.02768
scoring_system epss
scoring_elements 0.86054
published_at 2026-04-18T12:55:00Z
11
value 0.02768
scoring_system epss
scoring_elements 0.86046
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25311
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-25311
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jftp-4vmf-dyg1
8
url VCID-kvba-wgcs-xbd7
vulnerability_id VCID-kvba-wgcs-xbd7
summary condor: denial of service attack on Schedd via corrupt logfile
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3829
reference_id
reference_type
scores
0
value 0.01076
scoring_system epss
scoring_elements 0.77829
published_at 2026-04-21T12:55:00Z
1
value 0.01076
scoring_system epss
scoring_elements 0.7774
published_at 2026-04-01T12:55:00Z
2
value 0.01076
scoring_system epss
scoring_elements 0.77747
published_at 2026-04-02T12:55:00Z
3
value 0.01076
scoring_system epss
scoring_elements 0.77773
published_at 2026-04-04T12:55:00Z
4
value 0.01076
scoring_system epss
scoring_elements 0.77757
published_at 2026-04-07T12:55:00Z
5
value 0.01076
scoring_system epss
scoring_elements 0.77785
published_at 2026-04-08T12:55:00Z
6
value 0.01076
scoring_system epss
scoring_elements 0.7779
published_at 2026-04-09T12:55:00Z
7
value 0.01076
scoring_system epss
scoring_elements 0.77816
published_at 2026-04-11T12:55:00Z
8
value 0.01076
scoring_system epss
scoring_elements 0.778
published_at 2026-04-13T12:55:00Z
9
value 0.01076
scoring_system epss
scoring_elements 0.77836
published_at 2026-04-16T12:55:00Z
10
value 0.01076
scoring_system epss
scoring_elements 0.77835
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3829
2
reference_url http://secunia.com/advisories/32189
reference_id
reference_type
scores
url http://secunia.com/advisories/32189
3
reference_url http://secunia.com/advisories/32193
reference_id
reference_type
scores
url http://secunia.com/advisories/32193
4
reference_url http://secunia.com/advisories/32232
reference_id
reference_type
scores
url http://secunia.com/advisories/32232
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
6
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
7
reference_url http://www.redhat.com/support/errata/RHSA-2008-0911.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0911.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0924.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0924.html
9
reference_url http://www.securityfocus.com/bid/31621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31621
10
reference_url http://www.securitytracker.com/id?1021002
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021002
11
reference_url http://www.vupen.com/english/advisories/2008/2760
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2760
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463995
reference_id 463995
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463995
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3829
reference_id CVE-2008-3829
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3829
29
reference_url https://access.redhat.com/errata/RHSA-2008:0911
reference_id RHSA-2008:0911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0911
30
reference_url https://access.redhat.com/errata/RHSA-2008:0924
reference_id RHSA-2008:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0924
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3829
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kvba-wgcs-xbd7
9
url VCID-nkcc-sjac-dkcn
vulnerability_id VCID-nkcc-sjac-dkcn
summary Condor: Multiple format string flaws
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4930
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.27076
published_at 2026-04-01T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27116
published_at 2026-04-02T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27152
published_at 2026-04-04T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26944
published_at 2026-04-18T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27013
published_at 2026-04-08T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27058
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27061
published_at 2026-04-11T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27017
published_at 2026-04-12T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.2696
published_at 2026-04-13T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.2697
published_at 2026-04-16T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.2691
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4930
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=759548
reference_id 759548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=759548
3
reference_url https://access.redhat.com/errata/RHSA-2012:0099
reference_id RHSA-2012:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0099
4
reference_url https://access.redhat.com/errata/RHSA-2012:0100
reference_id RHSA-2012:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0100
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2011-4930
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkcc-sjac-dkcn
10
url VCID-q7ww-nrcw-zkcn
vulnerability_id VCID-q7ww-nrcw-zkcn
summary An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45104
reference_id
reference_type
scores
0
value 0.00116
scoring_system epss
scoring_elements 0.3035
published_at 2026-04-01T12:55:00Z
1
value 0.00116
scoring_system epss
scoring_elements 0.3038
published_at 2026-04-02T12:55:00Z
2
value 0.00116
scoring_system epss
scoring_elements 0.30426
published_at 2026-04-04T12:55:00Z
3
value 0.00116
scoring_system epss
scoring_elements 0.30239
published_at 2026-04-07T12:55:00Z
4
value 0.00116
scoring_system epss
scoring_elements 0.30299
published_at 2026-04-08T12:55:00Z
5
value 0.00116
scoring_system epss
scoring_elements 0.30334
published_at 2026-04-09T12:55:00Z
6
value 0.00116
scoring_system epss
scoring_elements 0.30338
published_at 2026-04-11T12:55:00Z
7
value 0.00116
scoring_system epss
scoring_elements 0.30294
published_at 2026-04-12T12:55:00Z
8
value 0.00116
scoring_system epss
scoring_elements 0.30245
published_at 2026-04-13T12:55:00Z
9
value 0.00116
scoring_system epss
scoring_elements 0.3026
published_at 2026-04-16T12:55:00Z
10
value 0.00116
scoring_system epss
scoring_elements 0.30242
published_at 2026-04-18T12:55:00Z
11
value 0.00116
scoring_system epss
scoring_elements 0.30197
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45104
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-45104
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q7ww-nrcw-zkcn
11
url VCID-t7ft-uyts-kbgc
vulnerability_id VCID-t7ft-uyts-kbgc
summary condor: privilege escalation via jobs submitted to the standard universe (CONDOR-2012-0003)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-5390
reference_id
reference_type
scores
0
value 0.01874
scoring_system epss
scoring_elements 0.83054
published_at 2026-04-01T12:55:00Z
1
value 0.01874
scoring_system epss
scoring_elements 0.8307
published_at 2026-04-02T12:55:00Z
2
value 0.01874
scoring_system epss
scoring_elements 0.83084
published_at 2026-04-04T12:55:00Z
3
value 0.01874
scoring_system epss
scoring_elements 0.83082
published_at 2026-04-07T12:55:00Z
4
value 0.01874
scoring_system epss
scoring_elements 0.83107
published_at 2026-04-08T12:55:00Z
5
value 0.01874
scoring_system epss
scoring_elements 0.83114
published_at 2026-04-09T12:55:00Z
6
value 0.01874
scoring_system epss
scoring_elements 0.8313
published_at 2026-04-11T12:55:00Z
7
value 0.01874
scoring_system epss
scoring_elements 0.83124
published_at 2026-04-12T12:55:00Z
8
value 0.01874
scoring_system epss
scoring_elements 0.8312
published_at 2026-04-13T12:55:00Z
9
value 0.01874
scoring_system epss
scoring_elements 0.83158
published_at 2026-04-18T12:55:00Z
10
value 0.01874
scoring_system epss
scoring_elements 0.83161
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-5390
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=894481
reference_id 894481
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=894481
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-5390
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t7ft-uyts-kbgc
12
url VCID-t9j5-gkyc-gbhw
vulnerability_id VCID-t9j5-gkyc-gbhw
summary condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0564.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0564.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0565.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0565.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4462
reference_id
reference_type
scores
0
value 0.00686
scoring_system epss
scoring_elements 0.71728
published_at 2026-04-21T12:55:00Z
1
value 0.00686
scoring_system epss
scoring_elements 0.71659
published_at 2026-04-01T12:55:00Z
2
value 0.00686
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-02T12:55:00Z
3
value 0.00686
scoring_system epss
scoring_elements 0.71683
published_at 2026-04-04T12:55:00Z
4
value 0.00686
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-07T12:55:00Z
5
value 0.00686
scoring_system epss
scoring_elements 0.71696
published_at 2026-04-13T12:55:00Z
6
value 0.00686
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-09T12:55:00Z
7
value 0.00686
scoring_system epss
scoring_elements 0.7173
published_at 2026-04-11T12:55:00Z
8
value 0.00686
scoring_system epss
scoring_elements 0.71714
published_at 2026-04-12T12:55:00Z
9
value 0.00686
scoring_system epss
scoring_elements 0.7174
published_at 2026-04-16T12:55:00Z
10
value 0.00686
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4462
4
reference_url https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
reference_id
reference_type
scores
url https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=860850
reference_id 860850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=860850
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4462
reference_id CVE-2012-4462
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4462
9
reference_url https://access.redhat.com/errata/RHSA-2013:0564
reference_id RHSA-2013:0564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0564
10
reference_url https://access.redhat.com/errata/RHSA-2013:0565
reference_id RHSA-2013:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0565
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2012-4462
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw
13
url VCID-w4bg-xh3m-8qcb
vulnerability_id VCID-w4bg-xh3m-8qcb
summary The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-5136
reference_id
reference_type
scores
0
value 0.00625
scoring_system epss
scoring_elements 0.70108
published_at 2026-04-01T12:55:00Z
1
value 0.00625
scoring_system epss
scoring_elements 0.7012
published_at 2026-04-02T12:55:00Z
2
value 0.00625
scoring_system epss
scoring_elements 0.70135
published_at 2026-04-04T12:55:00Z
3
value 0.00625
scoring_system epss
scoring_elements 0.70112
published_at 2026-04-07T12:55:00Z
4
value 0.00625
scoring_system epss
scoring_elements 0.70159
published_at 2026-04-08T12:55:00Z
5
value 0.00625
scoring_system epss
scoring_elements 0.70175
published_at 2026-04-09T12:55:00Z
6
value 0.00625
scoring_system epss
scoring_elements 0.70199
published_at 2026-04-11T12:55:00Z
7
value 0.00625
scoring_system epss
scoring_elements 0.70184
published_at 2026-04-12T12:55:00Z
8
value 0.00625
scoring_system epss
scoring_elements 0.70172
published_at 2026-04-13T12:55:00Z
9
value 0.00625
scoring_system epss
scoring_elements 0.70214
published_at 2026-04-16T12:55:00Z
10
value 0.00625
scoring_system epss
scoring_elements 0.70223
published_at 2026-04-18T12:55:00Z
11
value 0.00625
scoring_system epss
scoring_elements 0.70202
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-5136
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2009-5136
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w4bg-xh3m-8qcb
14
url VCID-x9xb-pzmk-zuch
vulnerability_id VCID-x9xb-pzmk-zuch
summary condor: buffer overflow in lookup_macro
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3828
reference_id
reference_type
scores
0
value 0.00214
scoring_system epss
scoring_elements 0.43895
published_at 2026-04-21T12:55:00Z
1
value 0.00214
scoring_system epss
scoring_elements 0.4389
published_at 2026-04-01T12:55:00Z
2
value 0.00214
scoring_system epss
scoring_elements 0.43935
published_at 2026-04-02T12:55:00Z
3
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-04T12:55:00Z
4
value 0.00214
scoring_system epss
scoring_elements 0.43887
published_at 2026-04-07T12:55:00Z
5
value 0.00214
scoring_system epss
scoring_elements 0.43938
published_at 2026-04-08T12:55:00Z
6
value 0.00214
scoring_system epss
scoring_elements 0.4394
published_at 2026-04-09T12:55:00Z
7
value 0.00214
scoring_system epss
scoring_elements 0.43958
published_at 2026-04-11T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43925
published_at 2026-04-12T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.4391
published_at 2026-04-13T12:55:00Z
10
value 0.00214
scoring_system epss
scoring_elements 0.43972
published_at 2026-04-16T12:55:00Z
11
value 0.00214
scoring_system epss
scoring_elements 0.43963
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3828
2
reference_url http://secunia.com/advisories/32189
reference_id
reference_type
scores
url http://secunia.com/advisories/32189
3
reference_url http://secunia.com/advisories/32193
reference_id
reference_type
scores
url http://secunia.com/advisories/32193
4
reference_url http://secunia.com/advisories/32232
reference_id
reference_type
scores
url http://secunia.com/advisories/32232
5
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html
6
reference_url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
reference_id
reference_type
scores
url http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000
7
reference_url http://www.redhat.com/support/errata/RHSA-2008-0911.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0911.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2008-0924.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0924.html
9
reference_url http://www.securityfocus.com/bid/31621
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31621
10
reference_url http://www.securitytracker.com/id?1021002
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021002
11
reference_url http://www.vupen.com/english/advisories/2008/2760
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2760
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=463990
reference_id 463990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=463990
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3828
reference_id CVE-2008-3828
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3828
29
reference_url https://access.redhat.com/errata/RHSA-2008:0911
reference_id RHSA-2008:0911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0911
30
reference_url https://access.redhat.com/errata/RHSA-2008:0924
reference_id RHSA-2008:0924
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0924
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2008-3828
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x9xb-pzmk-zuch
15
url VCID-ztyg-r17a-mkfu
vulnerability_id VCID-ztyg-r17a-mkfu
summary An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45103
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51517
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51569
published_at 2026-04-02T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51595
published_at 2026-04-04T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51556
published_at 2026-04-07T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.5161
published_at 2026-04-08T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51606
published_at 2026-04-09T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51656
published_at 2026-04-11T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51634
published_at 2026-04-12T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51618
published_at 2026-04-13T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51659
published_at 2026-04-16T12:55:00Z
10
value 0.00282
scoring_system epss
scoring_elements 0.51666
published_at 2026-04-18T12:55:00Z
11
value 0.00282
scoring_system epss
scoring_elements 0.51646
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45103
fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
aliases CVE-2021-45103
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyg-r17a-mkfu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie