Lookup for vulnerable packages by Package URL.

GET /api/packages/582307?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "condor",
    "version": "23.9.6+dfsg-2.1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "25.7.2+dfsg-1",
    "latest_non_vulnerable_version": "25.7.2+dfsg-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261869?format=api",
            "vulnerability_id": "VCID-153e-ka9n-eydy",
            "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56802",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56896",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56917",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56894",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56945",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56949",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56957",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56937",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56914",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56942",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56939",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56856",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56874",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56857",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45102"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-45102"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-153e-ka9n-eydy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/244219?format=api",
            "vulnerability_id": "VCID-1q6e-935y-puh5",
            "summary": "HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64159",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64216",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64244",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64205",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64255",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6427",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64283",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64272",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64245",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64279",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6429",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64299",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00463",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64312",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25312"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-25312"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1q6e-935y-puh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86985?format=api",
            "vulnerability_id": "VCID-2h9v-ygzk-subd",
            "summary": "condor: GIVE_REQUEST_AD leaks privileged ClaimId information",
            "references": [
                {
                    "reference_url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73524",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73387",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73395",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73418",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73391",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73428",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73441",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73465",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73445",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73437",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73479",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73488",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73482",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73515",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73526",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3493"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50666"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/09/20/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/09/20/9"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/55632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/55632"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210",
                    "reference_id": "688210",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=848222",
                    "reference_id": "848222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848222"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3493",
                    "reference_id": "CVE-2012-3493",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1278",
                    "reference_id": "RHSA-2012:1278",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1281",
                    "reference_id": "RHSA-2012:1281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1281"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api",
                    "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-3493"
            ],
            "risk_score": 2.6,
            "exploitability": "0.5",
            "weighted_severity": "5.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2h9v-ygzk-subd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/320501?format=api",
            "vulnerability_id": "VCID-2jbn-3er7-jub7",
            "summary": "HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30093",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41846",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4193",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42052",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4208",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42018",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4207",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42082",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42104",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42066",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42041",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42092",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41996",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41936",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30093"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101498",
                    "reference_id": "1101498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101498"
                },
                {
                    "reference_url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html",
                    "reference_id": "HTCONDOR-2025-0001.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:18:26Z/"
                        }
                    ],
                    "url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/921919?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-30093"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jbn-3er7-jub7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/337528?format=api",
            "vulnerability_id": "VCID-8k4z-8t2z-a3ew",
            "summary": "HTCondor Access Point before 25.3.1 allows an authenticated user to impersonate other users on the local machine by submitting a batch job. This is fixed in 24.12.14, 25.0.3, and 25.3.1. The earliest affected version is 24.7.3.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66433",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05204",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05352",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0539",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05432",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05233",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05257",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05313",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05278",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05263",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0525",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05195",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0002",
                            "scoring_system": "epss",
                            "scoring_elements": "0.05197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "9e-05",
                            "scoring_system": "epss",
                            "scoring_elements": "0.01002",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66433"
                },
                {
                    "reference_url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html",
                    "reference_id": "HTCONDOR-2025-0002.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T13:33:56Z/"
                        }
                    ],
                    "url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-66433"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-8t2z-a3ew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88328?format=api",
            "vulnerability_id": "VCID-9ury-14he-1qbg",
            "summary": "condor: users can run jobs with arbitrary owners",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22742",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22893",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23063",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23108",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22899",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22971",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23024",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23043",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23006",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2295",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22966",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22959",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22923",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22753",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00077",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22748",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3826"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32189"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32193"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32232"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"
                },
                {
                    "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/31621"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021002"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2760"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463987",
                    "reference_id": "463987",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463987"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3826",
                    "reference_id": "CVE-2008-3826",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911",
                    "reference_id": "RHSA-2008:0911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0911"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924",
                    "reference_id": "RHSA-2008:0924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0924"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-3826"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ury-14he-1qbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86983?format=api",
            "vulnerability_id": "VCID-b6rd-kvqr-93gr",
            "summary": "condor: local users can abort any idle jobs",
            "references": [
                {
                    "reference_url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7832",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7818",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78219",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78202",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78228",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78234",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7826",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78243",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78239",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7827",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78265",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78298",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78304",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3491"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50666"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/09/20/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/09/20/9"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/55632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/55632"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210",
                    "reference_id": "688210",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=848214",
                    "reference_id": "848214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848214"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3491",
                    "reference_id": "CVE-2012-3491",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1278",
                    "reference_id": "RHSA-2012:1278",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1281",
                    "reference_id": "RHSA-2012:1281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1281"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api",
                    "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-3491"
            ],
            "risk_score": 1.8,
            "exploitability": "0.5",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b6rd-kvqr-93gr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86986?format=api",
            "vulnerability_id": "VCID-e7tr-c4vp-aqc4",
            "summary": "condor: multiple buffer overflows",
            "references": [
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5196",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73767",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73631",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73641",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73638",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73673",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73686",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73708",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7369",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73681",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73724",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73733",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73725",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73758",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0078",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73766",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5196"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78975"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=869786",
                    "reference_id": "869786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869786"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5196",
                    "reference_id": "CVE-2012-5196",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5196"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api",
                    "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-5196"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7tr-c4vp-aqc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87927?format=api",
            "vulnerability_id": "VCID-ee1r-3kks-8uen",
            "summary": "Condor: queue super user cannot drop privs",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4133",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80624",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80632",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80654",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80649",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80677",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80703",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8069",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80681",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80719",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80742",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80746",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01434",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80759",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4133"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=544371",
                    "reference_id": "544371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544371"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1688",
                    "reference_id": "RHSA-2009:1688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1688"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1689",
                    "reference_id": "RHSA-2009:1689",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1689"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-4133"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ee1r-3kks-8uen"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88331?format=api",
            "vulnerability_id": "VCID-fdhn-w5fd-zuem",
            "summary": "condor: allow or deny with overlapping netmasks may be ignored",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17783",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17959",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18119",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18172",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17871",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17958",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18019",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18035",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1799",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17884",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17894",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17931",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17841",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00057",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17818",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3830"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32189"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32193"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32232"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"
                },
                {
                    "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/31621"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021002"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2760"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463997",
                    "reference_id": "463997",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463997"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3830",
                    "reference_id": "CVE-2008-3830",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3830"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911",
                    "reference_id": "RHSA-2008:0911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0911"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924",
                    "reference_id": "RHSA-2008:0924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0924"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-3830"
            ],
            "risk_score": 3.2,
            "exploitability": "0.5",
            "weighted_severity": "6.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fdhn-w5fd-zuem"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88407?format=api",
            "vulnerability_id": "VCID-g86f-7ywp-sya5",
            "summary": "condor: incorrect handling of wild cards in authorization lists",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7081",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70655",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7067",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70689",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70667",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70712",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70728",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7075",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70734",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70718",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70763",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7077",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70748",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70801",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00646",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70811",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3424"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31284"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31423"
                },
                {
                    "reference_url": "http://secunia.com/advisories/31459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/31459"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44063",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44063"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html"
                },
                {
                    "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0814.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0814.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0816.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0816.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/30440",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/30440"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1020646",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1020646"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=457372",
                    "reference_id": "457372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457372"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3424",
                    "reference_id": "CVE-2008-3424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3424"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0814",
                    "reference_id": "RHSA-2008:0814",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0814"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0816",
                    "reference_id": "RHSA-2008:0816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0816"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-3424"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g86f-7ywp-sya5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86984?format=api",
            "vulnerability_id": "VCID-gb62-cbpn-5fbe",
            "summary": "condor: lock directories created mode 0777 allow for FS-based authentication challenge bypass",
            "references": [
                {
                    "reference_url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72022",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71903",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7191",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71929",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71906",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71944",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71956",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7198",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71963",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71945",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71986",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7199",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71976",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7202",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00698",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72028",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3492"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50666",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50666"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2012/09/20/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2012/09/20/9"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/55632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/55632"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210",
                    "reference_id": "688210",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=848218",
                    "reference_id": "848218",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848218"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3492",
                    "reference_id": "CVE-2012-3492",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1278",
                    "reference_id": "RHSA-2012:1278",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1278"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1281",
                    "reference_id": "RHSA-2012:1281",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1281"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api",
                    "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-3492"
            ],
            "risk_score": 2.9,
            "exploitability": "0.5",
            "weighted_severity": "5.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gb62-cbpn-5fbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/244217?format=api",
            "vulnerability_id": "VCID-jftp-4vmf-dyg1",
            "summary": "condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25311",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85968",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85979",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85995",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85994",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86014",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86023",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86038",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86031",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86049",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86054",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86046",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86066",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86076",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86075",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25311"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-25311"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jftp-4vmf-dyg1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88330?format=api",
            "vulnerability_id": "VCID-kvba-wgcs-xbd7",
            "summary": "condor: denial of service attack on Schedd via corrupt logfile",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77883",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7774",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77773",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77757",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77785",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7779",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77816",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.778",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77836",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77835",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77829",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77861",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77869",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3829"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32189"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32193"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32232"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"
                },
                {
                    "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/31621"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021002"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2760"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463995",
                    "reference_id": "463995",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463995"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3829",
                    "reference_id": "CVE-2008-3829",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3829"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911",
                    "reference_id": "RHSA-2008:0911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0911"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924",
                    "reference_id": "RHSA-2008:0924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0924"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-3829"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvba-wgcs-xbd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87021?format=api",
            "vulnerability_id": "VCID-n74d-yydh-43bh",
            "summary": "condor: host based authentication does not implement forward-confirmed reverse dns",
            "references": [
                {
                    "reference_url": "http://osvdb.org/84766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://osvdb.org/84766"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1168.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1168.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1169.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-1169.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3416.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3416.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3416",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83202",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83056",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83073",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83086",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83085",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8311",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83117",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83134",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83123",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83161",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83164",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83187",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01876",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83194",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3416"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50246",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50246"
                },
                {
                    "reference_url": "http://secunia.com/advisories/50294",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/50294"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/55032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/55032"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1027395",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1027395"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685366",
                    "reference_id": "685366",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685366"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=841175",
                    "reference_id": "841175",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841175"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3416",
                    "reference_id": "CVE-2012-3416",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3416"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1168",
                    "reference_id": "RHSA-2012:1168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1168"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1169",
                    "reference_id": "RHSA-2012:1169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1169"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583709?format=api",
                    "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-3416"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n74d-yydh-43bh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87147?format=api",
            "vulnerability_id": "VCID-nkcc-sjac-dkcn",
            "summary": "Condor: Multiple format string flaws",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4930",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27076",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27116",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27152",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26944",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27013",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27058",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27061",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.27017",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2696",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2697",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2691",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26862",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26854",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26789",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4930"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=759548",
                    "reference_id": "759548",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=759548"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0099",
                    "reference_id": "RHSA-2012:0099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0100",
                    "reference_id": "RHSA-2012:0100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0100"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2011-4930"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nkcc-sjac-dkcn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261872?format=api",
            "vulnerability_id": "VCID-q7ww-nrcw-zkcn",
            "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45104",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3035",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3038",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30426",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30239",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30299",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30334",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30338",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30294",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30245",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3026",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30242",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30197",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30133",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30018",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29942",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45104"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-45104"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q7ww-nrcw-zkcn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58070?format=api",
            "vulnerability_id": "VCID-qjt1-vej1-kfav",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8126.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8126.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78949",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78956",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01199",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78973",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80755",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80783",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80791",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80807",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80728",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80784",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80821",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80824",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80825",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80792",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80737",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01451",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80758",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8126"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8126",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8126"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169800",
                    "reference_id": "1169800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169800"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775276",
                    "reference_id": "775276",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775276"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0035",
                    "reference_id": "RHSA-2015:0035",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0035"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0036",
                    "reference_id": "RHSA-2015:0036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0036"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4771-1/",
                    "reference_id": "USN-USN-4771-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4771-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586212?format=api",
                    "purl": "pkg:deb/debian/condor@8.2.3~dfsg.1-6?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.2.3~dfsg.1-6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-8126"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjt1-vej1-kfav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87488?format=api",
            "vulnerability_id": "VCID-s6t4-5qp1-fyd8",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63458",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63485",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6345",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63501",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63518",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6352",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63521",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63528",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63514",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63532",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63546",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00447",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63542",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26110"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008634",
                    "reference_id": "1008634",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008634"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585977?format=api",
                    "purl": "pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-26110"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s6t4-5qp1-fyd8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87486?format=api",
            "vulnerability_id": "VCID-s7bg-ynpu-gqem",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86079",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86089",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86105",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86135",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86149",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86148",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86161",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86167",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86179",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86188",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963777",
                    "reference_id": "963777",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963777"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585977?format=api",
                    "purl": "pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-18823"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s7bg-ynpu-gqem"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261867?format=api",
            "vulnerability_id": "VCID-ssr1-n586-aba6",
            "summary": "An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58321",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58407",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58426",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.584",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58453",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58459",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58477",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58457",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58438",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5847",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58475",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58452",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58413",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58411",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45101"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002540",
                    "reference_id": "1002540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002540"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/585977?format=api",
                    "purl": "pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-45101"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssr1-n586-aba6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86938?format=api",
            "vulnerability_id": "VCID-t7ft-uyts-kbgc",
            "summary": "condor: privilege escalation via jobs submitted to the standard universe (CONDOR-2012-0003)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5390",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83054",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8307",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83084",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83082",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83107",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83114",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8313",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83124",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8312",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83158",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83161",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83184",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83191",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83199",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5390"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=894481",
                    "reference_id": "894481",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894481"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-5390"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7ft-uyts-kbgc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86967?format=api",
            "vulnerability_id": "VCID-t9j5-gkyc-gbhw",
            "summary": "condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0564.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0564.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0565.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-0565.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4462",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71788",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71659",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71665",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71683",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71656",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71696",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71714",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7174",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71746",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71728",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71777",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71782",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4462"
                },
                {
                    "reference_url": "https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=860850",
                    "reference_id": "860850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860850"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4462",
                    "reference_id": "CVE-2012-4462",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0564",
                    "reference_id": "RHSA-2013:0564",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0564"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:0565",
                    "reference_id": "RHSA-2013:0565",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:0565"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-4462"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83841?format=api",
            "vulnerability_id": "VCID-un61-qbgx-tfbz",
            "summary": "condor: DoS of condor_schedd via specially crafted VOMS proxy",
            "references": [
                {
                    "reference_url": "http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16816.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16816.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70402",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70557",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70518",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70548",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70416",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70433",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70412",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70457",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70473",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70482",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70467",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00637",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7051",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16816"
                },
                {
                    "reference_url": "https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508887",
                    "reference_id": "1508887",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508887"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16816",
                    "reference_id": "CVE-2017-16816",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16816"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/USN-4771-1/",
                    "reference_id": "USN-USN-4771-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/USN-4771-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584545?format=api",
                    "purl": "pkg:deb/debian/condor@8.6.8~dfsg.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.6.8~dfsg.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-16816"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-un61-qbgx-tfbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/132019?format=api",
            "vulnerability_id": "VCID-w4bg-xh3m-8qcb",
            "summary": "The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5136",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70108",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7012",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70135",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70112",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70159",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70175",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70199",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70184",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70172",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70214",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70223",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70202",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70254",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70261",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00625",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7026",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5136"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2009-5136"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w4bg-xh3m-8qcb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86987?format=api",
            "vulnerability_id": "VCID-wxq1-xdb2-2ba7",
            "summary": "condor: multiple unspecified vulnerabilities (likely a duplicate of CVE-2012-3490)",
            "references": [
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"
                },
                {
                    "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72622",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72485",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72492",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72508",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72536",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7256",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72542",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72533",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72575",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72585",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72617",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00723",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72625",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5197"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78974",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78974"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=869803",
                    "reference_id": "869803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869803"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5197",
                    "reference_id": "CVE-2012-5197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5197"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api",
                    "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-5197"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxq1-xdb2-2ba7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88329?format=api",
            "vulnerability_id": "VCID-x9xb-pzmk-zuch",
            "summary": "condor: buffer overflow in lookup_macro",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43768",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4389",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43935",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43957",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43887",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43938",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4394",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43958",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43925",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4391",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43972",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43963",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43895",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43846",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00214",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43849",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3828"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32189"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32193"
                },
                {
                    "reference_url": "http://secunia.com/advisories/32232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/32232"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"
                },
                {
                    "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html"
                },
                {
                    "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/31621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/31621"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id?1021002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id?1021002"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2008/2760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2008/2760"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463990",
                    "reference_id": "463990",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463990"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3828",
                    "reference_id": "CVE-2008-3828",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3828"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911",
                    "reference_id": "RHSA-2008:0911",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0911"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924",
                    "reference_id": "RHSA-2008:0924",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0924"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2008-3828"
            ],
            "risk_score": 2.0,
            "exploitability": "0.5",
            "weighted_severity": "4.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x9xb-pzmk-zuch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86982?format=api",
            "vulnerability_id": "VCID-xka1-grec-tfa4",
            "summary": "condor: does not check return value of setuid and similar calls, exploitable via VMware support",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83078",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83081",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83447",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83446",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8347",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8348",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83494",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83488",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83484",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83419",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01956",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83432",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84005",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84013",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02073",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84018",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3490"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210",
                    "reference_id": "688210",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=848212",
                    "reference_id": "848212",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848212"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api",
                    "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2012-3490"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xka1-grec-tfa4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86585?format=api",
            "vulnerability_id": "VCID-y6dj-4ap5-5ycb",
            "summary": "condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4255.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4255.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72125",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72131",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72151",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72129",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72165",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72177",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.722",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72184",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7217",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72211",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7222",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72206",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72249",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72258",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72253",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4255"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721693",
                    "reference_id": "721693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721693"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=919401",
                    "reference_id": "919401",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=919401"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1171",
                    "reference_id": "RHSA-2013:1171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1171"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1172",
                    "reference_id": "RHSA-2013:1172",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1172"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/586505?format=api",
                    "purl": "pkg:deb/debian/condor@8.0.5~dfsg.1-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.0.5~dfsg.1-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-4255"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y6dj-4ap5-5ycb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261870?format=api",
            "vulnerability_id": "VCID-ztyg-r17a-mkfu",
            "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45103",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51517",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51569",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51595",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51556",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5161",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51606",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51656",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51634",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51618",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51659",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51666",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51646",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51597",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51603",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00282",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51563",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45103"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api",
                    "purl": "pkg:deb/debian/condor@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api",
                    "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api",
                    "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-45103"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyg-r17a-mkfu"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"
}