Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie |
| Type | deb |
| Namespace | debian |
| Name | condor |
| Version | 23.2.0+dfsg-1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 23.9.6+dfsg-2 |
| Latest_non_vulnerable_version | 25.7.2+dfsg-1 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-s6t4-5qp1-fyd8 |
| vulnerability_id |
VCID-s6t4-5qp1-fyd8 |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26110 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63458 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63485 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.6345 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63501 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63518 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63535 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.6352 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63521 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63528 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63514 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00447 |
| scoring_system |
epss |
| scoring_elements |
0.63532 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26110 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-26110
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s6t4-5qp1-fyd8 |
|
| 1 |
| url |
VCID-s7bg-ynpu-gqem |
| vulnerability_id |
VCID-s7bg-ynpu-gqem |
| summary |
security update |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-18823 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86079 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86089 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86105 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86123 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86135 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86149 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86148 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86144 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86161 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86158 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.02816 |
| scoring_system |
epss |
| scoring_elements |
0.86179 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-18823 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-18823
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s7bg-ynpu-gqem |
|
| 2 |
| url |
VCID-ssr1-n586-aba6 |
| vulnerability_id |
VCID-ssr1-n586-aba6 |
| summary |
An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45101 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58321 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58426 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.584 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58453 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58459 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58477 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58457 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58438 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.5847 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58475 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58452 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00364 |
| scoring_system |
epss |
| scoring_elements |
0.58413 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-45101 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-45101
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ssr1-n586-aba6 |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie |