Django REST framework
Api Root
Vulnerability List
Vulnerability Instance
Format
json
api
admin
Vulnerability Instance
Lookup for vulnerabilities affecting packages.
Vulnerability_id
VCID-t9j5-gkyc-gbhw
Summary
condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets
Aliases
0
alias
CVE-2012-4462
Fixed_packages
0
url
pkg:deb/debian/condor@0?distro=trixie
purl
pkg:deb/debian/condor@0?distro=trixie
is_vulnerable
false
affected_by_vulnerabilities
resource_url
http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie
1
url
pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
purl
pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie
is_vulnerable
false
affected_by_vulnerabilities
resource_url
http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie
2
url
pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
purl
pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie
is_vulnerable
false
affected_by_vulnerabilities
resource_url
http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie
Affected_packages
0
url
pkg:rpm/redhat/condor@7.8.8-0.4.1?arch=el5
purl
pkg:rpm/redhat/condor@7.8.8-0.4.1?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor@7.8.8-0.4.1%3Farch=el5
1
url
pkg:rpm/redhat/condor@7.8.8-0.4.1?arch=el6
purl
pkg:rpm/redhat/condor@7.8.8-0.4.1?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor@7.8.8-0.4.1%3Farch=el6
2
url
pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2?arch=el6
purl
pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2%3Farch=el6
3
url
pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2?arch=el5
purl
pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-ec2-enhanced@1.3.0-2%3Farch=el5
4
url
pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3?arch=el6
purl
pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3%3Farch=el6
5
url
pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3?arch=el5
purl
pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-ec2-enhanced-hooks@1.3.0-3%3Farch=el5
6
url
pkg:rpm/redhat/condor-job-hooks@1.5-6?arch=el5
purl
pkg:rpm/redhat/condor-job-hooks@1.5-6?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-job-hooks@1.5-6%3Farch=el5
7
url
pkg:rpm/redhat/condor-job-hooks@1.5-6?arch=el6
purl
pkg:rpm/redhat/condor-job-hooks@1.5-6?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-job-hooks@1.5-6%3Farch=el6
8
url
pkg:rpm/redhat/condor-low-latency@1.2-3?arch=el5
purl
pkg:rpm/redhat/condor-low-latency@1.2-3?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-low-latency@1.2-3%3Farch=el5
9
url
pkg:rpm/redhat/condor-low-latency@1.2-3?arch=el6
purl
pkg:rpm/redhat/condor-low-latency@1.2-3?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-low-latency@1.2-3%3Farch=el6
10
url
pkg:rpm/redhat/condor-wallaby@5.0.5-2?arch=el6
purl
pkg:rpm/redhat/condor-wallaby@5.0.5-2?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-wallaby@5.0.5-2%3Farch=el6
11
url
pkg:rpm/redhat/condor-wallaby@5.0.5-2?arch=el5
purl
pkg:rpm/redhat/condor-wallaby@5.0.5-2?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-wallaby@5.0.5-2%3Farch=el5
12
url
pkg:rpm/redhat/condor-wallaby-base-db@1.25-1?arch=el5
purl
pkg:rpm/redhat/condor-wallaby-base-db@1.25-1?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-wallaby-base-db@1.25-1%3Farch=el5
13
url
pkg:rpm/redhat/condor-wallaby-base-db@1.25-1?arch=el6_3
purl
pkg:rpm/redhat/condor-wallaby-base-db@1.25-1?arch=el6_3
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/condor-wallaby-base-db@1.25-1%3Farch=el6_3
14
url
pkg:rpm/redhat/cumin@0.1.5675-1?arch=el6
purl
pkg:rpm/redhat/cumin@0.1.5675-1?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cumin@0.1.5675-1%3Farch=el6
15
url
pkg:rpm/redhat/cumin@0.1.5675-1?arch=el5
purl
pkg:rpm/redhat/cumin@0.1.5675-1?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/cumin@0.1.5675-1%3Farch=el5
16
url
pkg:rpm/redhat/deltacloud-core@0.5.0-11?arch=el6cf
purl
pkg:rpm/redhat/deltacloud-core@0.5.0-11?arch=el6cf
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/deltacloud-core@0.5.0-11%3Farch=el6cf
17
url
pkg:rpm/redhat/python-boto@2.3.0-1.1?arch=el5
purl
pkg:rpm/redhat/python-boto@2.3.0-1.1?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/python-boto@2.3.0-1.1%3Farch=el5
18
url
pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4?arch=el6cf
purl
pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4?arch=el6cf
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-6h6n-7frd-1ked
1
vulnerability
VCID-91xe-ev7t-akb9
2
vulnerability
VCID-9qc2-be2u-vfgv
3
vulnerability
VCID-9uh8-upzm-7bgd
4
vulnerability
VCID-c3cm-h13f-jubq
5
vulnerability
VCID-ebq1-gkhe-pua7
6
vulnerability
VCID-hbtn-7423-m3gb
7
vulnerability
VCID-pb4n-q6u8-syds
8
vulnerability
VCID-t9j5-gkyc-gbhw
9
vulnerability
VCID-teq8-nqhf-xbbq
10
vulnerability
VCID-vspr-h3ds-dudq
11
vulnerability
VCID-y12d-fjpf-uubh
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-nokogiri@1.5.0-0.9.beta4%3Farch=el6cf
19
url
pkg:rpm/redhat/rubygem-rack@1:1.3.0-3?arch=el6cf
purl
pkg:rpm/redhat/rubygem-rack@1:1.3.0-3?arch=el6cf
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-67r2-k4bt-yqcr
1
vulnerability
VCID-91xe-ev7t-akb9
2
vulnerability
VCID-9uh8-upzm-7bgd
3
vulnerability
VCID-pb4n-q6u8-syds
4
vulnerability
VCID-t9j5-gkyc-gbhw
5
vulnerability
VCID-teq8-nqhf-xbbq
6
vulnerability
VCID-vspr-h3ds-dudq
7
vulnerability
VCID-y93x-twrw-bfbf
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rubygem-rack@1:1.3.0-3%3Farch=el6cf
20
url
pkg:rpm/redhat/ruby-rhubarb@0.4.3-5?arch=el5
purl
pkg:rpm/redhat/ruby-rhubarb@0.4.3-5?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby-rhubarb@0.4.3-5%3Farch=el5
21
url
pkg:rpm/redhat/ruby-rhubarb@0.4.3-5?arch=el6
purl
pkg:rpm/redhat/ruby-rhubarb@0.4.3-5?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby-rhubarb@0.4.3-5%3Farch=el6
22
url
pkg:rpm/redhat/ruby-spqr@0.3.6-3?arch=el5
purl
pkg:rpm/redhat/ruby-spqr@0.3.6-3?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby-spqr@0.3.6-3%3Farch=el5
23
url
pkg:rpm/redhat/ruby-spqr@0.3.6-3?arch=el6
purl
pkg:rpm/redhat/ruby-spqr@0.3.6-3?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/ruby-spqr@0.3.6-3%3Farch=el6
24
url
pkg:rpm/redhat/sesame@1.0-7?arch=el5
purl
pkg:rpm/redhat/sesame@1.0-7?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sesame@1.0-7%3Farch=el5
25
url
pkg:rpm/redhat/sesame@1.0-8?arch=el6
purl
pkg:rpm/redhat/sesame@1.0-8?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/sesame@1.0-8%3Farch=el6
26
url
pkg:rpm/redhat/wallaby@0.16.3-1?arch=el5
purl
pkg:rpm/redhat/wallaby@0.16.3-1?arch=el5
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wallaby@0.16.3-1%3Farch=el5
27
url
pkg:rpm/redhat/wallaby@0.16.3-1?arch=el6
purl
pkg:rpm/redhat/wallaby@0.16.3-1?arch=el6
is_vulnerable
true
affected_by_vulnerabilities
0
vulnerability
VCID-t9j5-gkyc-gbhw
resource_url
http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/wallaby@0.16.3-1%3Farch=el6
References
0
reference_url
http://rhn.redhat.com/errata/RHSA-2013-0564.html
reference_id
reference_type
scores
url
http://rhn.redhat.com/errata/RHSA-2013-0564.html
1
reference_url
http://rhn.redhat.com/errata/RHSA-2013-0565.html
reference_id
reference_type
scores
url
http://rhn.redhat.com/errata/RHSA-2013-0565.html
2
reference_url
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json
reference_id
reference_type
scores
url
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json
3
reference_url
https://api.first.org/data/v1/epss?cve=CVE-2012-4462
reference_id
reference_type
scores
0
value
0.00686
scoring_system
epss
scoring_elements
0.71746
published_at
2026-04-18T12:55:00Z
1
value
0.00686
scoring_system
epss
scoring_elements
0.71659
published_at
2026-04-01T12:55:00Z
2
value
0.00686
scoring_system
epss
scoring_elements
0.71665
published_at
2026-04-02T12:55:00Z
3
value
0.00686
scoring_system
epss
scoring_elements
0.71683
published_at
2026-04-04T12:55:00Z
4
value
0.00686
scoring_system
epss
scoring_elements
0.71656
published_at
2026-04-07T12:55:00Z
5
value
0.00686
scoring_system
epss
scoring_elements
0.71696
published_at
2026-04-13T12:55:00Z
6
value
0.00686
scoring_system
epss
scoring_elements
0.71707
published_at
2026-04-09T12:55:00Z
7
value
0.00686
scoring_system
epss
scoring_elements
0.7173
published_at
2026-04-11T12:55:00Z
8
value
0.00686
scoring_system
epss
scoring_elements
0.71714
published_at
2026-04-12T12:55:00Z
9
value
0.00686
scoring_system
epss
scoring_elements
0.7174
published_at
2026-04-16T12:55:00Z
url
https://api.first.org/data/v1/epss?cve=CVE-2012-4462
4
reference_url
https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
reference_id
reference_type
scores
url
https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84
5
reference_url
https://bugzilla.redhat.com/show_bug.cgi?id=860850
reference_id
860850
reference_type
scores
url
https://bugzilla.redhat.com/show_bug.cgi?id=860850
6
reference_url
https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_id
cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
reference_type
scores
url
https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
7
reference_url
https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
reference_id
cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
reference_type
scores
url
https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*
8
reference_url
https://nvd.nist.gov/vuln/detail/CVE-2012-4462
reference_id
CVE-2012-4462
reference_type
scores
0
value
4.3
scoring_system
cvssv2
scoring_elements
AV:N/AC:M/Au:N/C:N/I:N/A:P
url
https://nvd.nist.gov/vuln/detail/CVE-2012-4462
9
reference_url
https://access.redhat.com/errata/RHSA-2013:0564
reference_id
RHSA-2013:0564
reference_type
scores
url
https://access.redhat.com/errata/RHSA-2013:0564
10
reference_url
https://access.redhat.com/errata/RHSA-2013:0565
reference_id
RHSA-2013:0565
reference_type
scores
url
https://access.redhat.com/errata/RHSA-2013:0565
Weaknesses
0
cwe_id
20
name
Improper Input Validation
description
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Exploits
Severity_range_score
4.3 - 4.3
Exploitability
0.5
Weighted_severity
3.9
Risk_score
1.9
Resource_url
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw
×
Create
None
×
Edit
None