{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","type":"deb","namespace":"debian","name":"condor","version":"23.9.6+dfsg-2.1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"25.7.2+dfsg-1","latest_non_vulnerable_version":"25.7.2+dfsg-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/261869?format=json","vulnerability_id":"VCID-153e-ka9n-eydy","summary":"An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45102","reference_id":"","reference_type":"","scores":[{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56896","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56894","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56945","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56942","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56874","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56857","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45102"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-45102"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-153e-ka9n-eydy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/244219?format=json","vulnerability_id":"VCID-1q6e-935y-puh5","summary":"HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25312","reference_id":"","reference_type":"","scores":[{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.6427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.6429","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64312","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25312"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-25312"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1q6e-935y-puh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86985?format=json","vulnerability_id":"VCID-2h9v-ygzk-subd","summary":"condor: GIVE_REQUEST_AD leaks privileged ClaimId information","references":[{"reference_url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972","reference_id":"","reference_type":"","scores":[],"url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=d2f33972"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3493.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3493","reference_id":"","reference_type":"","scores":[{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73524","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73387","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73428","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73441","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73465","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73445","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73437","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73488","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73482","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73515","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00765","scoring_system":"epss","scoring_elements":"0.73526","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3493"},{"reference_url":"http://secunia.com/advisories/50666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50666"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/20/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/20/9"},{"reference_url":"http://www.securityfocus.com/bid/55632","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210","reference_id":"688210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=848222","reference_id":"848222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=848222"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3493","reference_id":"CVE-2012-3493","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1278","reference_id":"RHSA-2012:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1281","reference_id":"RHSA-2012:1281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1281"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3493"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2h9v-ygzk-subd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/320501?format=json","vulnerability_id":"VCID-2jbn-3er7-jub7","summary":"HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30093","reference_id":"","reference_type":"","scores":[{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41846","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.4193","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42052","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.4208","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42018","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.4207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42082","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42104","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42041","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.42092","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41996","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41936","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-30093"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101498","reference_id":"1101498","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1101498"},{"reference_url":"https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html","reference_id":"HTCONDOR-2025-0001.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-28T15:18:26Z/"}],"url":"https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0001.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/921919?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2025-30093"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jbn-3er7-jub7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/337528?format=json","vulnerability_id":"VCID-8k4z-8t2z-a3ew","summary":"HTCondor Access Point before 25.3.1 allows an authenticated user to impersonate other users on the local machine by submitting a batch job. This is fixed in 24.12.14, 25.0.3, and 25.3.1. The earliest affected version is 24.7.3.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66433","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05432","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05257","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05195","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05197","published_at":"2026-04-18T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.01002","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66433"},{"reference_url":"https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html","reference_id":"HTCONDOR-2025-0002.html","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T13:33:56Z/"}],"url":"https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2025-66433"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-8t2z-a3ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88328?format=json","vulnerability_id":"VCID-9ury-14he-1qbg","summary":"condor: users can run jobs with arbitrary owners","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3826","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22742","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23043","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22966","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22959","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22923","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22753","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22748","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3826"},{"reference_url":"http://secunia.com/advisories/32189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32189"},{"reference_url":"http://secunia.com/advisories/32193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32193"},{"reference_url":"http://secunia.com/advisories/32232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32232"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html"},{"reference_url":"http://www.securityfocus.com/bid/31621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31621"},{"reference_url":"http://www.securitytracker.com/id?1021002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021002"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2760","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463987","reference_id":"463987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463987"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3826","reference_id":"CVE-2008-3826","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0911","reference_id":"RHSA-2008:0911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0924","reference_id":"RHSA-2008:0924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0924"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3826"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ury-14he-1qbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86983?format=json","vulnerability_id":"VCID-b6rd-kvqr-93gr","summary":"condor: local users can abort any idle jobs","references":[{"reference_url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40","reference_id":"","reference_type":"","scores":[],"url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1fff5d40"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3491.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3491","reference_id":"","reference_type":"","scores":[{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7832","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7818","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78202","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78234","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7826","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78243","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.7827","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0112","scoring_system":"epss","scoring_elements":"0.78304","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3491"},{"reference_url":"http://secunia.com/advisories/50666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50666"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/20/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/20/9"},{"reference_url":"http://www.securityfocus.com/bid/55632","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210","reference_id":"688210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=848214","reference_id":"848214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=848214"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3491","reference_id":"CVE-2012-3491","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3491"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1278","reference_id":"RHSA-2012:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1281","reference_id":"RHSA-2012:1281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1281"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3491"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b6rd-kvqr-93gr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86986?format=json","vulnerability_id":"VCID-e7tr-c4vp-aqc4","summary":"condor: multiple buffer overflows","references":[{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5196","reference_id":"","reference_type":"","scores":[{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73767","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73673","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.7369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73724","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0078","scoring_system":"epss","scoring_elements":"0.73766","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5196"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78975","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78975"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=869786","reference_id":"869786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=869786"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5196","reference_id":"CVE-2012-5196","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5196"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5196"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7tr-c4vp-aqc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87927?format=json","vulnerability_id":"VCID-ee1r-3kks-8uen","summary":"Condor: queue super user cannot drop privs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4133","reference_id":"","reference_type":"","scores":[{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80624","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80677","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.8069","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80716","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80719","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80759","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4133"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=544371","reference_id":"544371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=544371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1688","reference_id":"RHSA-2009:1688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1689","reference_id":"RHSA-2009:1689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1689"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2009-4133"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ee1r-3kks-8uen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88331?format=json","vulnerability_id":"VCID-fdhn-w5fd-zuem","summary":"condor: allow or deny with overlapping netmasks may be ignored","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3830","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17959","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17894","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17841","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17818","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3830"},{"reference_url":"http://secunia.com/advisories/32189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32189"},{"reference_url":"http://secunia.com/advisories/32193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32193"},{"reference_url":"http://secunia.com/advisories/32232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32232"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html"},{"reference_url":"http://www.securityfocus.com/bid/31621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31621"},{"reference_url":"http://www.securitytracker.com/id?1021002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021002"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2760","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463997","reference_id":"463997","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463997"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3830","reference_id":"CVE-2008-3830","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0911","reference_id":"RHSA-2008:0911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0924","reference_id":"RHSA-2008:0924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0924"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3830"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fdhn-w5fd-zuem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88407?format=json","vulnerability_id":"VCID-g86f-7ywp-sya5","summary":"condor: incorrect handling of wild cards in authorization lists","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3424","reference_id":"","reference_type":"","scores":[{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7081","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70763","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70748","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70801","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70811","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3424"},{"reference_url":"http://secunia.com/advisories/31284","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31284"},{"reference_url":"http://secunia.com/advisories/31423","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31423"},{"reference_url":"http://secunia.com/advisories/31459","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31459"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44063","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44063"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0814.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0814.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0816.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0816.html"},{"reference_url":"http://www.securityfocus.com/bid/30440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30440"},{"reference_url":"http://www.securitytracker.com/id?1020646","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=457372","reference_id":"457372","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=457372"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3424","reference_id":"CVE-2008-3424","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0814","reference_id":"RHSA-2008:0814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0816","reference_id":"RHSA-2008:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0816"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3424"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g86f-7ywp-sya5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86984?format=json","vulnerability_id":"VCID-gb62-cbpn-5fbe","summary":"condor: lock directories created mode 0777 allow for FS-based authentication challenge bypass","references":[{"reference_url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805","reference_id":"","reference_type":"","scores":[],"url":"http://condor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=1db67805"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1278.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1281.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3492.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3492","reference_id":"","reference_type":"","scores":[{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72022","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71903","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7191","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71929","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71944","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7199","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71976","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7202","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72028","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3492"},{"reference_url":"http://secunia.com/advisories/50666","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50666"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/09/20/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/09/20/9"},{"reference_url":"http://www.securityfocus.com/bid/55632","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210","reference_id":"688210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=848218","reference_id":"848218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=848218"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3492","reference_id":"CVE-2012-3492","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1278","reference_id":"RHSA-2012:1278","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1281","reference_id":"RHSA-2012:1281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1281"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3492"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gb62-cbpn-5fbe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/244217?format=json","vulnerability_id":"VCID-jftp-4vmf-dyg1","summary":"condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25311","reference_id":"","reference_type":"","scores":[{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.85968","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.85979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.85995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.85994","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86023","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86075","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25311"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-25311"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jftp-4vmf-dyg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88330?format=json","vulnerability_id":"VCID-kvba-wgcs-xbd7","summary":"condor: denial of service attack on Schedd via corrupt logfile","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3829","reference_id":"","reference_type":"","scores":[{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.7774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77773","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.7779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.778","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77836","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77835","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77829","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77869","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3829"},{"reference_url":"http://secunia.com/advisories/32189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32189"},{"reference_url":"http://secunia.com/advisories/32193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32193"},{"reference_url":"http://secunia.com/advisories/32232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32232"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html"},{"reference_url":"http://www.securityfocus.com/bid/31621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31621"},{"reference_url":"http://www.securitytracker.com/id?1021002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021002"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2760","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463995","reference_id":"463995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463995"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3829","reference_id":"CVE-2008-3829","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0911","reference_id":"RHSA-2008:0911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0924","reference_id":"RHSA-2008:0924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0924"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3829"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvba-wgcs-xbd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87021?format=json","vulnerability_id":"VCID-n74d-yydh-43bh","summary":"condor: host based authentication does not implement forward-confirmed reverse dns","references":[{"reference_url":"http://osvdb.org/84766","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/84766"},{"reference_url":"http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1168.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1168.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1169.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1169.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3416","reference_id":"","reference_type":"","scores":[{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83202","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83056","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83073","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.8311","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83134","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83123","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83161","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01876","scoring_system":"epss","scoring_elements":"0.83194","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3416"},{"reference_url":"http://secunia.com/advisories/50246","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50246"},{"reference_url":"http://secunia.com/advisories/50294","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50294"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77748","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/77748"},{"reference_url":"http://www.securityfocus.com/bid/55032","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55032"},{"reference_url":"http://www.securitytracker.com/id?1027395","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027395"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685366","reference_id":"685366","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685366"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=841175","reference_id":"841175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=841175"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3416","reference_id":"CVE-2012-3416","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3416"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1168","reference_id":"RHSA-2012:1168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1169","reference_id":"RHSA-2012:1169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1169"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583709?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3416"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n74d-yydh-43bh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87147?format=json","vulnerability_id":"VCID-nkcc-sjac-dkcn","summary":"Condor: Multiple format string flaws","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4930","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27116","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27152","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26944","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27017","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2697","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26862","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26789","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4930"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=759548","reference_id":"759548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=759548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0099","reference_id":"RHSA-2012:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0100","reference_id":"RHSA-2012:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0100"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2011-4930"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nkcc-sjac-dkcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/261872?format=json","vulnerability_id":"VCID-q7ww-nrcw-zkcn","summary":"An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45104","reference_id":"","reference_type":"","scores":[{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30239","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30299","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30334","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30338","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30294","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3026","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30197","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30018","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29942","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45104"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-45104"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q7ww-nrcw-zkcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58070?format=json","vulnerability_id":"VCID-qjt1-vej1-kfav","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8126.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8126","reference_id":"","reference_type":"","scores":[{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78956","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01199","scoring_system":"epss","scoring_elements":"0.78973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80783","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80791","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80728","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80784","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80824","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80825","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80737","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01451","scoring_system":"epss","scoring_elements":"0.80758","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169800","reference_id":"1169800","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1169800"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775276","reference_id":"775276","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0035","reference_id":"RHSA-2015:0035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0035"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0036","reference_id":"RHSA-2015:0036","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0036"},{"reference_url":"https://usn.ubuntu.com/USN-4771-1/","reference_id":"USN-USN-4771-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4771-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586212?format=json","purl":"pkg:deb/debian/condor@8.2.3~dfsg.1-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.2.3~dfsg.1-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8126"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qjt1-vej1-kfav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87488?format=json","vulnerability_id":"VCID-s6t4-5qp1-fyd8","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26110","reference_id":"","reference_type":"","scores":[{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63485","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.6345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63501","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63518","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.6352","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63528","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63546","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00447","scoring_system":"epss","scoring_elements":"0.63542","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26110"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008634","reference_id":"1008634","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008634"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585977?format=json","purl":"pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2022-26110"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s6t4-5qp1-fyd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87486?format=json","vulnerability_id":"VCID-s7bg-ynpu-gqem","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18823","reference_id":"","reference_type":"","scores":[{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86079","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86135","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86149","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86167","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02816","scoring_system":"epss","scoring_elements":"0.86188","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18823"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26110"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963777","reference_id":"963777","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=963777"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585977?format=json","purl":"pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2019-18823"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s7bg-ynpu-gqem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/261867?format=json","vulnerability_id":"VCID-ssr1-n586-aba6","summary":"An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45101","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58426","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58459","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58457","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58438","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58475","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58413","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58411","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45101"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002540","reference_id":"1002540","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002540"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585977?format=json","purl":"pkg:deb/debian/condor@23.2.0%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.2.0%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-45101"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ssr1-n586-aba6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86938?format=json","vulnerability_id":"VCID-t7ft-uyts-kbgc","summary":"condor: privilege escalation via jobs submitted to the standard universe (CONDOR-2012-0003)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5390","reference_id":"","reference_type":"","scores":[{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83054","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.8307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83082","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.8313","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83124","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.8312","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83161","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83184","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83191","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83199","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5390"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=894481","reference_id":"894481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=894481"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5390"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t7ft-uyts-kbgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86967?format=json","vulnerability_id":"VCID-t9j5-gkyc-gbhw","summary":"condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0564.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0564.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0565.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0565.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4462","reference_id":"","reference_type":"","scores":[{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71659","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71683","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.7173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71714","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.7174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71746","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71777","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71782","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4462"},{"reference_url":"https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84","reference_id":"","reference_type":"","scores":[],"url":"https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=860850","reference_id":"860850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=860850"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4462","reference_id":"CVE-2012-4462","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0564","reference_id":"RHSA-2013:0564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0565","reference_id":"RHSA-2013:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0565"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-4462"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83841?format=json","vulnerability_id":"VCID-un61-qbgx-tfbz","summary":"condor: DoS of condor_schedd via specially crafted VOMS proxy","references":[{"reference_url":"http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/htcondor/security/vulnerabilities/HTCONDOR-2017-0001.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16816.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16816","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70402","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70557","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70518","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70548","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70416","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70433","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70412","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70473","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70482","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70467","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7051","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16816"},{"reference_url":"https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml","reference_id":"","reference_type":"","scores":[],"url":"https://www-auth.cs.wisc.edu/lists/htcondor-users/2017-November/msg00022.shtml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508887","reference_id":"1508887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1508887"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wisc:htcondor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16816","reference_id":"CVE-2017-16816","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16816"},{"reference_url":"https://usn.ubuntu.com/USN-4771-1/","reference_id":"USN-USN-4771-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4771-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584545?format=json","purl":"pkg:deb/debian/condor@8.6.8~dfsg.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.6.8~dfsg.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2017-16816"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-un61-qbgx-tfbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/132019?format=json","vulnerability_id":"VCID-w4bg-xh3m-8qcb","summary":"The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5136","reference_id":"","reference_type":"","scores":[{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70108","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.7012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70214","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70202","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70261","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.7026","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5136"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2009-5136"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w4bg-xh3m-8qcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86987?format=json","vulnerability_id":"VCID-wxq1-xdb2-2ba7","summary":"condor: multiple unspecified vulnerabilities (likely a duplicate of CVE-2012-3490)","references":[{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.6/8_3Stable_Release.html"},{"reference_url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html","reference_id":"","reference_type":"","scores":[],"url":"http://research.cs.wisc.edu/condor/manual/v7.8/9_3Stable_Release.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5197.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5197","reference_id":"","reference_type":"","scores":[{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72622","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72485","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72508","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.7256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72575","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72585","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00723","scoring_system":"epss","scoring_elements":"0.72625","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5197"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78974","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78974"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=869803","reference_id":"869803","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=869803"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5197","reference_id":"CVE-2012-5197","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-5197"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5197"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wxq1-xdb2-2ba7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88329?format=json","vulnerability_id":"VCID-x9xb-pzmk-zuch","summary":"condor: buffer overflow in lookup_macro","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3828","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4389","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43938","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4394","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43972","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43895","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43849","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3828"},{"reference_url":"http://secunia.com/advisories/32189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32189"},{"reference_url":"http://secunia.com/advisories/32193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32193"},{"reference_url":"http://secunia.com/advisories/32232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32232"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html"},{"reference_url":"http://www.securityfocus.com/bid/31621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31621"},{"reference_url":"http://www.securitytracker.com/id?1021002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021002"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2760","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463990","reference_id":"463990","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463990"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3828","reference_id":"CVE-2008-3828","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0911","reference_id":"RHSA-2008:0911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0924","reference_id":"RHSA-2008:0924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0924"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3828"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x9xb-pzmk-zuch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86982?format=json","vulnerability_id":"VCID-xka1-grec-tfa4","summary":"condor: does not check return value of setuid and similar calls, exploitable via VMware support","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3490","reference_id":"","reference_type":"","scores":[{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83078","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83081","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83446","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.8347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.8348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83419","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01956","scoring_system":"epss","scoring_elements":"0.83432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02073","scoring_system":"epss","scoring_elements":"0.84005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02073","scoring_system":"epss","scoring_elements":"0.84013","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02073","scoring_system":"epss","scoring_elements":"0.84018","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3490"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210","reference_id":"688210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=688210"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=848212","reference_id":"848212","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=848212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582306?format=json","purl":"pkg:deb/debian/condor@7.8.2~dfsg.1-1%2Bdeb7u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@7.8.2~dfsg.1-1%252Bdeb7u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-3490"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xka1-grec-tfa4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86585?format=json","vulnerability_id":"VCID-y6dj-4ap5-5ycb","summary":"condor: condor_startd DoS when parsing policy definition that evaluates to ERROR or UNDEFINED","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4255.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4255.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4255","reference_id":"","reference_type":"","scores":[{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72125","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.722","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.7217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.7222","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72206","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72258","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00707","scoring_system":"epss","scoring_elements":"0.72253","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4255"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721693","reference_id":"721693","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721693"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=919401","reference_id":"919401","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=919401"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1171","reference_id":"RHSA-2013:1171","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1171"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1172","reference_id":"RHSA-2013:1172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1172"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586505?format=json","purl":"pkg:deb/debian/condor@8.0.5~dfsg.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@8.0.5~dfsg.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4255"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y6dj-4ap5-5ycb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/261870?format=json","vulnerability_id":"VCID-ztyg-r17a-mkfu","summary":"An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45103","reference_id":"","reference_type":"","scores":[{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51517","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5161","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51606","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51618","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51597","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51563","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45103"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-45103"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyg-r17a-mkfu"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"}