{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","type":"deb","namespace":"debian","name":"condor","version":"7.8.2~dfsg.1-1+deb7u1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.0.5~dfsg.1-1","latest_non_vulnerable_version":"25.7.2+dfsg-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86985?format=json","vulnerability_id":"VCID-2h9v-ygzk-subd","summary":"condor: GIVE_REQUEST_AD leaks privileged ClaimId information","references":[{"reference_url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972","reference_id":"","reference_type":"","scores":[],"url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3493","reference_id":"","reference_type":"","scores":[{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73518","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73387","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73428","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73441","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73465","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73445","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73437","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73488","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73482","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73515","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73526","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73524","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3493"},{"reference_url":"http://secunia.com/advisories/50666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50666"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/20/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/20/9"},{"reference_url":"http://www.securityfocus.com/bid/55632","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210","reference_id":"688210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=848222","reference_id":"848222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=848222"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3493","reference_id":"CVE-2012-3493","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1278","reference_id":"RHSA-2012:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1281","reference_id":"RHSA-2012:1281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1281"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3493"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2h9v-ygzk-subd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86983?format=json","vulnerability_id":"VCID-b6rd-kvqr-93gr","summary":"condor: local users can abort any idle jobs","references":[{"reference_url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40","reference_id":"","reference_type":"","scores":[],"url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3491","reference_id":"","reference_type":"","scores":[{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78333","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7818","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78202","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78234","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7826","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7827","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78304","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7832","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3491"},{"reference_url":"http://secunia.com/advisories/50666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50666"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/20/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/20/9"},{"reference_url":"http://www.securityfocus.com/bid/55632","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210","reference_id":"688210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=848214","reference_id":"848214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=848214"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3491","reference_id":"CVE-2012-3491","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1278","reference_id":"RHSA-2012:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1281","reference_id":"RHSA-2012:1281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1281"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3491"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b6rd-kvqr-93gr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86986?format=json","vulnerability_id":"VCID-e7tr-c4vp-aqc4","summary":"condor: multiple buffer overflows","references":[{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5196","reference_id":"","reference_type":"","scores":[{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.7376","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.7369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5196"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78975","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78975"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=869786","reference_id":"869786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=869786"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5196","reference_id":"CVE-2012-5196","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5196"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5196"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7tr-c4vp-aqc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86984?format=json","vulnerability_id":"VCID-gb62-cbpn-5fbe","summary":"condor: lock directories created mode 0777 allow for FS-based authentication challenge bypass","references":[{"reference_url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805","reference_id":"","reference_type":"","scores":[],"url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3492","reference_id":"","reference_type":"","scores":[{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72015","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71903","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71929","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71944","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7199","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71976","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72028","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72022","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492"},{"reference_url":"http://secunia.com/advisories/50666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50666"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/20/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/20/9"},{"reference_url":"http://www.securityfocus.com/bid/55632","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210","reference_id":"688210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=848218","reference_id":"848218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=848218"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3492","reference_id":"CVE-2012-3492","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1278","reference_id":"RHSA-2012:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1281","reference_id":"RHSA-2012:1281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1281"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3492"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gb62-cbpn-5fbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86987?format=json","vulnerability_id":"VCID-wxq1-xdb2-2ba7","summary":"condor: multiple unspecified vulnerabilities (likely a duplicate of CVE-2012-3490)","references":[{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5197","reference_id":"","reference_type":"","scores":[{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72614","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72485","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72508","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.7256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72575","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72622","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5197"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78974","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78974"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=869803","reference_id":"869803","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=869803"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5197","reference_id":"CVE-2012-5197","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5197"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5197"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxq1-xdb2-2ba7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86982?format=json","vulnerability_id":"VCID-xka1-grec-tfa4","summary":"condor: does not check return value of setuid and similar calls, exploitable via VMware support","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3490","reference_id":"","reference_type":"","scores":[{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83078","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83081","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.8347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.8348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83419","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02073","scoring_system":"epss","scoring_elements":"0.84005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02073","scoring_system":"epss","scoring_elements":"0.84013","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02073","scoring_system":"epss","scoring_elements":"0.84018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02073","scoring_system":"epss","scoring_elements":"0.8404","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3490"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210","reference_id":"688210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=848212","reference_id":"848212","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=848212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3490"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xka1-grec-tfa4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"}