Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-t9j5-gkyc-gbhw
Summarycondor: DoS when removing jobs via jobcontrol.py when job id is in square brackets
Aliases
0
alias CVE-2012-4462
Fixed_packages
0
url pkg:deb/debian/condor@0?distro=trixie
purl pkg:deb/debian/condor@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
Affected_packages
0
url pkg:rpm/redhat/condor@7.8.8-0.4.1?arch=el5
purl pkg:rpm/redhat/condor@7.8.8-0.4.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor@7.8.8-0.4.1%3Farch=el5
1
url pkg:rpm/redhat/condor@7.8.8-0.4.1?arch=el6
purl pkg:rpm/redhat/condor@7.8.8-0.4.1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor@7.8.8-0.4.1%3Farch=el6
2
url pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2?arch=el6
purl pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2%3Farch=el6
3
url pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2?arch=el5
purl pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2%3Farch=el5
4
url pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3?arch=el6
purl pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3%3Farch=el6
5
url pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3?arch=el5
purl pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3%3Farch=el5
6
url pkg:rpm/redhat/condor-job-hooks@1.5-6?arch=el5
purl pkg:rpm/redhat/condor-job-hooks@1.5-6?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-job-hooks@1.5-6%3Farch=el5
7
url pkg:rpm/redhat/condor-job-hooks@1.5-6?arch=el6
purl pkg:rpm/redhat/condor-job-hooks@1.5-6?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-job-hooks@1.5-6%3Farch=el6
8
url pkg:rpm/redhat/condor-low-latency@1.2-3?arch=el5
purl pkg:rpm/redhat/condor-low-latency@1.2-3?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-low-latency@1.2-3%3Farch=el5
9
url pkg:rpm/redhat/condor-low-latency@1.2-3?arch=el6
purl pkg:rpm/redhat/condor-low-latency@1.2-3?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-low-latency@1.2-3%3Farch=el6
10
url pkg:rpm/redhat/condor-wallaby@5.0.5-2?arch=el6
purl pkg:rpm/redhat/condor-wallaby@5.0.5-2?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-wallaby@5.0.5-2%3Farch=el6
11
url pkg:rpm/redhat/condor-wallaby@5.0.5-2?arch=el5
purl pkg:rpm/redhat/condor-wallaby@5.0.5-2?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-wallaby@5.0.5-2%3Farch=el5
12
url pkg:rpm/redhat/condor-wallaby-base-db@1.25-1?arch=el5
purl pkg:rpm/redhat/condor-wallaby-base-db@1.25-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-wallaby-base-db@1.25-1%3Farch=el5
13
url pkg:rpm/redhat/condor-wallaby-base-db@1.25-1?arch=el6_3
purl pkg:rpm/redhat/condor-wallaby-base-db@1.25-1?arch=el6_3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-wallaby-base-db@1.25-1%3Farch=el6_3
14
url pkg:rpm/redhat/cumin@0.1.5675-1?arch=el6
purl pkg:rpm/redhat/cumin@0.1.5675-1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cumin@0.1.5675-1%3Farch=el6
15
url pkg:rpm/redhat/cumin@0.1.5675-1?arch=el5
purl pkg:rpm/redhat/cumin@0.1.5675-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cumin@0.1.5675-1%3Farch=el5
16
url pkg:rpm/redhat/deltacloud-core@0.5.0-11?arch=el6cf
purl pkg:rpm/redhat/deltacloud-core@0.5.0-11?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/deltacloud-core@0.5.0-11%3Farch=el6cf
17
url pkg:rpm/redhat/python-boto@2.3.0-1.1?arch=el5
purl pkg:rpm/redhat/python-boto@2.3.0-1.1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-boto@2.3.0-1.1%3Farch=el5
18
url pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4?arch=el6cf
purl pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6h6n-7frd-1ked
1
vulnerability VCID-91xe-ev7t-akb9
2
vulnerability VCID-9qc2-be2u-vfgv
3
vulnerability VCID-9uh8-upzm-7bgd
4
vulnerability VCID-c3cm-h13f-jubq
5
vulnerability VCID-ebq1-gkhe-pua7
6
vulnerability VCID-hbtn-7423-m3gb
7
vulnerability VCID-pb4n-q6u8-syds
8
vulnerability VCID-t9j5-gkyc-gbhw
9
vulnerability VCID-teq8-nqhf-xbbq
10
vulnerability VCID-vspr-h3ds-dudq
11
vulnerability VCID-y12d-fjpf-uubh
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4%3Farch=el6cf
19
url pkg:rpm/redhat/rubygem-rack@1:1.3.0-3?arch=el6cf
purl pkg:rpm/redhat/rubygem-rack@1:1.3.0-3?arch=el6cf
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-67r2-k4bt-yqcr
1
vulnerability VCID-91xe-ev7t-akb9
2
vulnerability VCID-9uh8-upzm-7bgd
3
vulnerability VCID-pb4n-q6u8-syds
4
vulnerability VCID-t9j5-gkyc-gbhw
5
vulnerability VCID-teq8-nqhf-xbbq
6
vulnerability VCID-vspr-h3ds-dudq
7
vulnerability VCID-y93x-twrw-bfbf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-rack@1:1.3.0-3%3Farch=el6cf
20
url pkg:rpm/redhat/ruby-rhubarb@0.4.3-5?arch=el5
purl pkg:rpm/redhat/ruby-rhubarb@0.4.3-5?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby-rhubarb@0.4.3-5%3Farch=el5
21
url pkg:rpm/redhat/ruby-rhubarb@0.4.3-5?arch=el6
purl pkg:rpm/redhat/ruby-rhubarb@0.4.3-5?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby-rhubarb@0.4.3-5%3Farch=el6
22
url pkg:rpm/redhat/ruby-spqr@0.3.6-3?arch=el5
purl pkg:rpm/redhat/ruby-spqr@0.3.6-3?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby-spqr@0.3.6-3%3Farch=el5
23
url pkg:rpm/redhat/ruby-spqr@0.3.6-3?arch=el6
purl pkg:rpm/redhat/ruby-spqr@0.3.6-3?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby-spqr@0.3.6-3%3Farch=el6
24
url pkg:rpm/redhat/sesame@1.0-7?arch=el5
purl pkg:rpm/redhat/sesame@1.0-7?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sesame@1.0-7%3Farch=el5
25
url pkg:rpm/redhat/sesame@1.0-8?arch=el6
purl pkg:rpm/redhat/sesame@1.0-8?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sesame@1.0-8%3Farch=el6
26
url pkg:rpm/redhat/wallaby@0.16.3-1?arch=el5
purl pkg:rpm/redhat/wallaby@0.16.3-1?arch=el5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wallaby@0.16.3-1%3Farch=el5
27
url pkg:rpm/redhat/wallaby@0.16.3-1?arch=el6
purl pkg:rpm/redhat/wallaby@0.16.3-1?arch=el6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t9j5-gkyc-gbhw
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wallaby@0.16.3-1%3Farch=el6
References
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0564.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0564.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2013-0565.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0565.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4462
reference_id
reference_type
scores
0
value 0.00686
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-18T12:55:00Z
1
value 0.00686
scoring_system epss
scoring_elements 0.71659
published_at 2026-04-01T12:55:00Z
2
value 0.00686
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-02T12:55:00Z
3
value 0.00686
scoring_system epss
scoring_elements 0.71683
published_at 2026-04-04T12:55:00Z
4
value 0.00686
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-07T12:55:00Z
5
value 0.00686
scoring_system epss
scoring_elements 0.71696
published_at 2026-04-13T12:55:00Z
6
value 0.00686
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-09T12:55:00Z
7
value 0.00686
scoring_system epss
scoring_elements 0.7173
published_at 2026-04-11T12:55:00Z
8
value 0.00686
scoring_system epss
scoring_elements 0.71714
published_at 2026-04-12T12:55:00Z
9
value 0.00686
scoring_system epss
scoring_elements 0.7174
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4462
4
reference_url https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
reference_id
reference_type
scores
url https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=860850
reference_id 860850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=860850
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4462
reference_id CVE-2012-4462
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4462
9
reference_url https://access.redhat.com/errata/RHSA-2013:0564
reference_id RHSA-2013:0564
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0564
10
reference_url https://access.redhat.com/errata/RHSA-2013:0565
reference_id RHSA-2013:0565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0565
Weaknesses
0
cwe_id 20
name Improper Input Validation
description The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score4.3 - 4.3
Exploitability0.5
Weighted_severity3.9
Risk_score1.9
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw