Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/582307?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "type": "deb", "namespace": "debian", "name": "condor", "version": "23.9.6+dfsg-2.1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "25.7.2+dfsg-1", "latest_non_vulnerable_version": "25.7.2+dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261869?format=api", "vulnerability_id": "VCID-153e-ka9n-eydy", "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45102", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56802", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56894", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56949", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56957", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56937", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56914", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56942", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56939", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56856", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56874", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56857", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45102" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-45102" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-153e-ka9n-eydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/244219?format=api", "vulnerability_id": "VCID-1q6e-935y-puh5", "summary": "HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25312", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64159", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64205", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6427", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64283", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6429", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64299", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64312", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25312" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-25312" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1q6e-935y-puh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86985?format=api", "vulnerability_id": "VCID-2h9v-ygzk-subd", "summary": "condor: GIVE_REQUEST_AD leaks privileged ClaimId information", "references": [ { "reference_url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972", "reference_id": "", "reference_type": "", "scores": [], "url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972" }, { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html" }, { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3493", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73524", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73387", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73418", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73391", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73428", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73441", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73465", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73445", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73437", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73488", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73482", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73515", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73526", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3493" }, { "reference_url": "http://secunia.com/advisories/50666", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50666" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/09/20/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/09/20/9" }, { "reference_url": "http://www.securityfocus.com/bid/55632", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/55632" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210", "reference_id": "688210", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=848222", "reference_id": "848222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848222" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3493", "reference_id": "CVE-2012-3493", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1278", "reference_id": "RHSA-2012:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1281", "reference_id": "RHSA-2012:1281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1281" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api", "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3493" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2h9v-ygzk-subd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/320501?format=api", "vulnerability_id": "VCID-2jbn-3er7-jub7", "summary": "HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30093", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41846", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.4193", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42052", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.4208", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42018", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.4207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42082", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42104", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42066", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42041", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.42092", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41996", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00199", "scoring_system": "epss", "scoring_elements": "0.41936", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30093" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101498", "reference_id": "1101498", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101498" }, { "reference_url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html", "reference_id": "HTCONDOR-2025-0001.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:18:26Z/" } ], "url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/921919?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-30093" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jbn-3er7-jub7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/337528?format=api", "vulnerability_id": "VCID-8k4z-8t2z-a3ew", "summary": "HTCondor Access Point before 25.3.1 allows an authenticated user to impersonate other users on the local machine by submitting a batch job. This is fixed in 24.12.14, 25.0.3, and 25.3.1. The earliest affected version is 24.7.3.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66433", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05204", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05352", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0539", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05432", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05233", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05257", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05292", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05263", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05195", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.01002", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66433" }, { "reference_url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html", "reference_id": "HTCONDOR-2025-0002.html", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T13:33:56Z/" } ], "url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-66433" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-8t2z-a3ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88328?format=api", "vulnerability_id": "VCID-9ury-14he-1qbg", "summary": "condor: users can run jobs with arbitrary owners", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22742", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22893", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23063", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23108", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22971", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23024", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23043", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2295", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22966", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22959", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22923", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22753", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22748", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3826" }, { "reference_url": "http://secunia.com/advisories/32189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32189" }, { "reference_url": "http://secunia.com/advisories/32193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32193" }, { "reference_url": "http://secunia.com/advisories/32232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32232" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html" }, { "reference_url": "http://www.securityfocus.com/bid/31621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31621" }, { "reference_url": "http://www.securitytracker.com/id?1021002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021002" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2760" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463987", "reference_id": "463987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463987" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3826", "reference_id": "CVE-2008-3826", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911", "reference_id": "RHSA-2008:0911", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0911" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924", "reference_id": "RHSA-2008:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0924" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3826" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ury-14he-1qbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86983?format=api", "vulnerability_id": "VCID-b6rd-kvqr-93gr", "summary": "condor: local users can abort any idle jobs", "references": [ { "reference_url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40", "reference_id": "", "reference_type": "", "scores": [], "url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40" }, { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html" }, { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3491", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.7832", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.7818", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78202", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78228", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78234", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.7826", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78243", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78239", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.7827", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78268", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78265", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78298", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0112", "scoring_system": "epss", "scoring_elements": "0.78304", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3491" }, { "reference_url": "http://secunia.com/advisories/50666", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50666" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/09/20/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/09/20/9" }, { "reference_url": "http://www.securityfocus.com/bid/55632", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/55632" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210", "reference_id": "688210", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=848214", "reference_id": "848214", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848214" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3491", "reference_id": "CVE-2012-3491", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1278", "reference_id": "RHSA-2012:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1281", "reference_id": "RHSA-2012:1281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1281" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api", "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3491" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b6rd-kvqr-93gr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86986?format=api", "vulnerability_id": "VCID-e7tr-c4vp-aqc4", "summary": "condor: multiple buffer overflows", "references": [ { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html" }, { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5196", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73767", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73631", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73641", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73638", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73673", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73686", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.7369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73724", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73733", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73725", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73758", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0078", "scoring_system": "epss", "scoring_elements": "0.73766", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5196" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78975" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=869786", "reference_id": "869786", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869786" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5196", "reference_id": "CVE-2012-5196", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5196" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api", "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-5196" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e7tr-c4vp-aqc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87927?format=api", "vulnerability_id": "VCID-ee1r-3kks-8uen", "summary": "Condor: queue super user cannot drop privs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80624", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80632", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80654", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80677", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.8069", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80719", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80742", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80759", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4133" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=544371", "reference_id": "544371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544371" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1688", "reference_id": "RHSA-2009:1688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1689", "reference_id": "RHSA-2009:1689", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1689" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-4133" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ee1r-3kks-8uen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88331?format=api", "vulnerability_id": "VCID-fdhn-w5fd-zuem", "summary": "condor: allow or deny with overlapping netmasks may be ignored", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17783", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17959", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18119", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18172", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17958", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17884", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17894", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17931", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17841", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17818", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3830" }, { "reference_url": "http://secunia.com/advisories/32189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32189" }, { "reference_url": "http://secunia.com/advisories/32193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32193" }, { "reference_url": "http://secunia.com/advisories/32232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32232" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html" }, { "reference_url": "http://www.securityfocus.com/bid/31621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31621" }, { "reference_url": "http://www.securitytracker.com/id?1021002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021002" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2760" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463997", "reference_id": "463997", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463997" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3830", "reference_id": "CVE-2008-3830", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911", "reference_id": "RHSA-2008:0911", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0911" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924", "reference_id": "RHSA-2008:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0924" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3830" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fdhn-w5fd-zuem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88407?format=api", "vulnerability_id": "VCID-g86f-7ywp-sya5", "summary": "condor: incorrect handling of wild cards in authorization lists", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.7081", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.7067", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70689", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70667", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70712", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.7075", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70718", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70763", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.7077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70748", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70801", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70811", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3424" }, { "reference_url": "http://secunia.com/advisories/31284", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31284" }, { "reference_url": "http://secunia.com/advisories/31423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31423" }, { "reference_url": "http://secunia.com/advisories/31459", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31459" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44063" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0814.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0814.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0816.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0816.html" }, { "reference_url": "http://www.securityfocus.com/bid/30440", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/30440" }, { "reference_url": "http://www.securitytracker.com/id?1020646", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1020646" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=457372", "reference_id": "457372", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457372" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3424", "reference_id": "CVE-2008-3424", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0814", "reference_id": "RHSA-2008:0814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0814" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0816", "reference_id": "RHSA-2008:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0816" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3424" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g86f-7ywp-sya5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86984?format=api", "vulnerability_id": "VCID-gb62-cbpn-5fbe", "summary": "condor: lock directories created mode 0777 allow for FS-based authentication challenge bypass", "references": [ { "reference_url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805", "reference_id": "", "reference_type": "", "scores": [], "url": "http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805" }, { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html" }, { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1278.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1281.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.72022", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71903", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.7191", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71929", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71906", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71944", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71956", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.7198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71963", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71945", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71986", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.7199", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.71976", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.7202", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00698", "scoring_system": "epss", "scoring_elements": "0.72028", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492" }, { "reference_url": "http://secunia.com/advisories/50666", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50666" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/09/20/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/09/20/9" }, { "reference_url": "http://www.securityfocus.com/bid/55632", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/55632" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210", "reference_id": "688210", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=848218", "reference_id": "848218", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848218" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3492", "reference_id": "CVE-2012-3492", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1278", "reference_id": "RHSA-2012:1278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1281", "reference_id": "RHSA-2012:1281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1281" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api", "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3492" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gb62-cbpn-5fbe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/244217?format=api", "vulnerability_id": "VCID-jftp-4vmf-dyg1", "summary": "condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.85968", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.85979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.85995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.85994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86014", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86023", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86038", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86031", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86049", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86054", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86066", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86076", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86075", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25311" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-25311" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jftp-4vmf-dyg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88330?format=api", "vulnerability_id": "VCID-kvba-wgcs-xbd7", "summary": "condor: denial of service attack on Schedd via corrupt logfile", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77883", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.7774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77773", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77757", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77785", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.7779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77836", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77835", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77829", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77861", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77869", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3829" }, { "reference_url": "http://secunia.com/advisories/32189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32189" }, { "reference_url": "http://secunia.com/advisories/32193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32193" }, { "reference_url": "http://secunia.com/advisories/32232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32232" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html" }, { "reference_url": "http://www.securityfocus.com/bid/31621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31621" }, { "reference_url": "http://www.securitytracker.com/id?1021002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021002" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2760" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463995", "reference_id": "463995", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463995" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3829", "reference_id": "CVE-2008-3829", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911", "reference_id": "RHSA-2008:0911", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0911" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924", "reference_id": "RHSA-2008:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0924" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3829" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvba-wgcs-xbd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87021?format=api", "vulnerability_id": "VCID-n74d-yydh-43bh", "summary": "condor: host based authentication does not implement forward-confirmed reverse dns", "references": [ { "reference_url": "http://osvdb.org/84766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/84766" }, { "reference_url": "http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1168.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1168.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1169.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1169.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3416.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3416.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3416", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83202", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83056", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83073", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83086", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.8311", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83117", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83134", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83128", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83123", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83161", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83164", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83187", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01876", "scoring_system": "epss", "scoring_elements": "0.83194", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3416" }, { "reference_url": "http://secunia.com/advisories/50246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50246" }, { "reference_url": "http://secunia.com/advisories/50294", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50294" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77748" }, { "reference_url": "http://www.securityfocus.com/bid/55032", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/55032" }, { "reference_url": "http://www.securitytracker.com/id?1027395", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027395" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685366", "reference_id": "685366", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685366" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=841175", "reference_id": "841175", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841175" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3416", "reference_id": "CVE-2012-3416", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3416" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1168", "reference_id": "RHSA-2012:1168", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1168" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1169", "reference_id": "RHSA-2012:1169", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1169" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583709?format=api", "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3416" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n74d-yydh-43bh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87147?format=api", "vulnerability_id": "VCID-nkcc-sjac-dkcn", "summary": "Condor: Multiple format string flaws", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4930", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27116", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27152", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26944", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27013", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27058", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27061", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2696", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2697", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26862", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26854", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26789", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4930" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=759548", "reference_id": "759548", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=759548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0099", "reference_id": "RHSA-2012:0099", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0100", "reference_id": "RHSA-2012:0100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0100" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4930" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nkcc-sjac-dkcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261872?format=api", "vulnerability_id": "VCID-q7ww-nrcw-zkcn", "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45104", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3035", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30239", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30334", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30338", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30294", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3026", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30242", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30197", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30133", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30018", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29942", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45104" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-45104" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q7ww-nrcw-zkcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58070?format=api", "vulnerability_id": "VCID-qjt1-vej1-kfav", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8126.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8126.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8126", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78949", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78956", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01199", "scoring_system": "epss", "scoring_elements": "0.78973", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80755", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80783", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80791", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80807", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80728", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80784", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80821", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80824", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80825", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80792", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80737", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01451", "scoring_system": "epss", "scoring_elements": "0.80758", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8126" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8126", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8126" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169800", "reference_id": "1169800", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1169800" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775276", "reference_id": "775276", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0035", "reference_id": "RHSA-2015:0035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0036", "reference_id": "RHSA-2015:0036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0036" }, { "reference_url": "https://usn.ubuntu.com/USN-4771-1/", "reference_id": "USN-USN-4771-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4771-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586212?format=api", "purl": "pkg:deb/debian/condor@8.2.3~dfsg.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.2.3~dfsg.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-8126" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qjt1-vej1-kfav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87488?format=api", "vulnerability_id": "VCID-s6t4-5qp1-fyd8", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26110", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63458", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63485", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.6345", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63501", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63518", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.6352", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63521", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63528", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63514", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63532", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63546", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63542", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-26110" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008634", "reference_id": "1008634", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008634" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585977?format=api", "purl": "pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-26110" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s6t4-5qp1-fyd8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87486?format=api", "vulnerability_id": "VCID-s7bg-ynpu-gqem", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86079", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86089", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86105", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86123", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86135", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86149", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86148", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86161", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02816", "scoring_system": "epss", "scoring_elements": "0.86188", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963777", "reference_id": "963777", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963777" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585977?format=api", "purl": "pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-18823" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s7bg-ynpu-gqem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261867?format=api", "vulnerability_id": "VCID-ssr1-n586-aba6", "summary": "An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45101", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58321", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58407", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58426", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.584", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58459", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58477", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58457", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58438", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.5847", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58475", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58452", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58413", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58411", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45101" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002540", "reference_id": "1002540", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002540" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585977?format=api", "purl": "pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-45101" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ssr1-n586-aba6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86938?format=api", "vulnerability_id": "VCID-t7ft-uyts-kbgc", "summary": "condor: privilege escalation via jobs submitted to the standard universe (CONDOR-2012-0003)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5390", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83054", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.8307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83084", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83082", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83107", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83114", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.8313", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83124", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.8312", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83158", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83161", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83184", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83191", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83199", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5390" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=894481", "reference_id": "894481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894481" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-5390" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7ft-uyts-kbgc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86967?format=api", "vulnerability_id": "VCID-t9j5-gkyc-gbhw", "summary": "condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0564.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0564.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0565.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0565.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4462", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71683", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71696", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71707", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.7173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71714", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.7174", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71777", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71782", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4462" }, { "reference_url": "https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84", "reference_id": "", "reference_type": "", "scores": [], "url": "https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=860850", "reference_id": "860850", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860850" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4462", "reference_id": "CVE-2012-4462", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0564", "reference_id": "RHSA-2013:0564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0565", "reference_id": "RHSA-2013:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0565" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-4462" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83841?format=api", "vulnerability_id": "VCID-un61-qbgx-tfbz", "summary": "condor: DoS of condor_schedd via specially crafted VOMS proxy", "references": [ { "reference_url": "http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16816.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16816.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16816", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70402", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70557", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70518", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70548", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70416", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70433", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70412", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70457", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70473", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70482", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7051", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16816" }, { "reference_url": "https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508887", "reference_id": "1508887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508887" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16816", "reference_id": "CVE-2017-16816", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16816" }, { "reference_url": "https://usn.ubuntu.com/USN-4771-1/", "reference_id": "USN-USN-4771-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4771-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584545?format=api", "purl": "pkg:deb/debian/condor@8.6.8~dfsg.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.6.8~dfsg.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-16816" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-un61-qbgx-tfbz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/132019?format=api", "vulnerability_id": "VCID-w4bg-xh3m-8qcb", "summary": "The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70108", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.7012", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70135", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70159", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70175", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70202", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70254", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70261", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.7026", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5136" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-5136" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w4bg-xh3m-8qcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86987?format=api", "vulnerability_id": "VCID-wxq1-xdb2-2ba7", "summary": "condor: multiple unspecified vulnerabilities (likely a duplicate of CVE-2012-3490)", "references": [ { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html" }, { "reference_url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5197", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72622", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72485", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72492", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72508", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72524", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.7256", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72533", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72575", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72585", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72617", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00723", "scoring_system": "epss", "scoring_elements": "0.72625", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5197" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78974" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=869803", "reference_id": "869803", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869803" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5197", "reference_id": "CVE-2012-5197", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5197" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api", "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-5197" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxq1-xdb2-2ba7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88329?format=api", "vulnerability_id": "VCID-x9xb-pzmk-zuch", "summary": "condor: buffer overflow in lookup_macro", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43768", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.4389", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43935", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43887", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43938", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.4394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43958", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43925", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.4391", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43972", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43895", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43846", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43849", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3828" }, { "reference_url": "http://secunia.com/advisories/32189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32189" }, { "reference_url": "http://secunia.com/advisories/32193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32193" }, { "reference_url": "http://secunia.com/advisories/32232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32232" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html" }, { "reference_url": "http://www.securityfocus.com/bid/31621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31621" }, { "reference_url": "http://www.securitytracker.com/id?1021002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021002" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2760" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463990", "reference_id": "463990", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463990" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3828", "reference_id": "CVE-2008-3828", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911", "reference_id": "RHSA-2008:0911", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0911" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924", "reference_id": "RHSA-2008:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0924" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3828" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x9xb-pzmk-zuch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86982?format=api", "vulnerability_id": "VCID-xka1-grec-tfa4", "summary": "condor: does not check return value of setuid and similar calls, exploitable via VMware support", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83078", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83081", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83446", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.8347", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.8348", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83494", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83488", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83419", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01956", "scoring_system": "epss", "scoring_elements": "0.83432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02073", "scoring_system": "epss", "scoring_elements": "0.84005", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02073", "scoring_system": "epss", "scoring_elements": "0.84013", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02073", "scoring_system": "epss", "scoring_elements": "0.84018", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3490" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210", "reference_id": "688210", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=848212", "reference_id": "848212", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=848212" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582306?format=api", "purl": "pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3490" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xka1-grec-tfa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86585?format=api", "vulnerability_id": "VCID-y6dj-4ap5-5ycb", "summary": "condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4255.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4255.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4255", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72125", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72131", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72151", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72129", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72165", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72177", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.722", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.7217", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72211", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.7222", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72206", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72249", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72258", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00707", "scoring_system": "epss", "scoring_elements": "0.72253", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4255" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721693", "reference_id": "721693", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721693" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=919401", "reference_id": "919401", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=919401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1171", "reference_id": "RHSA-2013:1171", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1171" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1172", "reference_id": "RHSA-2013:1172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1172" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586505?format=api", "purl": "pkg:deb/debian/condor@8.0.5~dfsg.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.0.5~dfsg.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-4255" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y6dj-4ap5-5ycb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261870?format=api", "vulnerability_id": "VCID-ztyg-r17a-mkfu", "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45103", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51517", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51569", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51556", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.5161", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51606", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51618", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51646", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51597", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51563", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45103" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-45103" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyg-r17a-mkfu" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }