Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/582860?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "type": "deb", "namespace": "debian", "name": "condor", "version": "0", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "7.8.2~dfsg.1-1", "latest_non_vulnerable_version": "25.8.2+dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261869?format=api", "vulnerability_id": "VCID-153e-ka9n-eydy", "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45102", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56802", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56917", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56894", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56945", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56949", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56957", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56937", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56914", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56942", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56939", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56856", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56874", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56857", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56812", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56858", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.56918", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00342", "scoring_system": "epss", "scoring_elements": "0.5687", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45102" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-45102" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-153e-ka9n-eydy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/244219?format=api", "vulnerability_id": "VCID-1q6e-935y-puh5", "summary": "HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25312", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64159", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64205", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64255", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6427", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64283", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6429", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64299", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64312", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64284", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64329", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64373", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64343", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.64367", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00463", "scoring_system": "epss", "scoring_elements": "0.6442", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25312" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-25312" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1q6e-935y-puh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/337528?format=api", "vulnerability_id": "VCID-8k4z-8t2z-a3ew", "summary": "HTCondor Access Point before 25.3.1 allows an authenticated user to impersonate other users on the local machine by submitting a batch job. This is fixed in 24.12.14, 25.0.3, and 25.3.1. The earliest affected version is 24.7.3.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66433", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01422", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.0141", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00011", "scoring_system": "epss", "scoring_elements": "0.01414", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05292", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05263", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05204", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05197", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05352", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0539", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05432", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05195", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05233", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05257", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.01006", "published_at": "2026-05-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.01003", "published_at": "2026-05-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.01002", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66433" }, { "reference_url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html", "reference_id": "HTCONDOR-2025-0002.html", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T13:33:56Z/" } ], "url": "https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-66433" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-8t2z-a3ew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88328?format=api", "vulnerability_id": "VCID-9ury-14he-1qbg", "summary": "condor: users can run jobs with arbitrary owners", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3826", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22857", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22893", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23063", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23108", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22971", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23024", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23043", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.2295", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22966", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22959", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22923", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22753", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22748", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22742", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22642", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22726", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22802", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22766", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22782", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3826" }, { "reference_url": "http://secunia.com/advisories/32189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32189" }, { "reference_url": "http://secunia.com/advisories/32193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32193" }, { "reference_url": "http://secunia.com/advisories/32232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32232" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html" }, { "reference_url": "http://www.securityfocus.com/bid/31621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31621" }, { "reference_url": "http://www.securitytracker.com/id?1021002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021002" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2760" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463987", "reference_id": "463987", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463987" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3826", "reference_id": "CVE-2008-3826", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911", "reference_id": "RHSA-2008:0911", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0911" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924", "reference_id": "RHSA-2008:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0924" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3826" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ury-14he-1qbg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87927?format=api", "vulnerability_id": "VCID-ee1r-3kks-8uen", "summary": "Condor: queue super user cannot drop privs", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4133", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80624", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80632", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80654", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80677", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.8069", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80681", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80716", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80719", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80742", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80759", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80777", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80799", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.8082", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80814", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80832", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01434", "scoring_system": "epss", "scoring_elements": "0.80876", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4133" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=544371", "reference_id": "544371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=544371" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1688", "reference_id": "RHSA-2009:1688", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1688" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1689", "reference_id": "RHSA-2009:1689", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1689" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-4133" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ee1r-3kks-8uen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88331?format=api", "vulnerability_id": "VCID-fdhn-w5fd-zuem", "summary": "condor: allow or deny with overlapping netmasks may be ignored", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17911", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17959", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18119", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18172", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17958", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.18035", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.1794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17884", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17894", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17931", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17841", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17818", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17783", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17637", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17729", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17832", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17793", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17829", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3830" }, { "reference_url": "http://secunia.com/advisories/32189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32189" }, { "reference_url": "http://secunia.com/advisories/32193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32193" }, { "reference_url": "http://secunia.com/advisories/32232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32232" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html" }, { "reference_url": "http://www.securityfocus.com/bid/31621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31621" }, { "reference_url": "http://www.securitytracker.com/id?1021002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021002" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2760" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463997", "reference_id": "463997", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463997" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3830", "reference_id": "CVE-2008-3830", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3830" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911", "reference_id": "RHSA-2008:0911", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0911" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924", "reference_id": "RHSA-2008:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0924" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3830" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fdhn-w5fd-zuem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88407?format=api", "vulnerability_id": "VCID-g86f-7ywp-sya5", "summary": "condor: incorrect handling of wild cards in authorization lists", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3424", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70916", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.7067", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70689", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70667", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70712", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70728", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.7075", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70734", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70718", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70763", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.7077", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70748", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70801", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70811", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.7081", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70792", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70833", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70869", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70835", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70862", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3424" }, { "reference_url": "http://secunia.com/advisories/31284", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31284" }, { "reference_url": "http://secunia.com/advisories/31423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31423" }, { "reference_url": "http://secunia.com/advisories/31459", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31459" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44063" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0814.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0814.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0816.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0816.html" }, { "reference_url": "http://www.securityfocus.com/bid/30440", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/30440" }, { "reference_url": "http://www.securitytracker.com/id?1020646", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1020646" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=457372", "reference_id": "457372", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=457372" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3424", "reference_id": "CVE-2008-3424", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0814", "reference_id": "RHSA-2008:0814", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0814" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0816", "reference_id": "RHSA-2008:0816", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0816" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3424" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g86f-7ywp-sya5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/244217?format=api", "vulnerability_id": "VCID-jftp-4vmf-dyg1", "summary": "condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.85968", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.85979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.85995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.85994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86014", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86023", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86038", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86031", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86049", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86054", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86066", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86076", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86075", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86094", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86116", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86134", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.8613", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86143", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02768", "scoring_system": "epss", "scoring_elements": "0.86183", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25311" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-25311" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jftp-4vmf-dyg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88330?format=api", "vulnerability_id": "VCID-kvba-wgcs-xbd7", "summary": "condor: denial of service attack on Schedd via corrupt logfile", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77996", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.7774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77773", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77757", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77785", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.7779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77816", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.778", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77836", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77835", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77829", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77861", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77883", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77894", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77924", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77942", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77932", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01076", "scoring_system": "epss", "scoring_elements": "0.77951", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3829" }, { "reference_url": "http://secunia.com/advisories/32189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32189" }, { "reference_url": "http://secunia.com/advisories/32193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32193" }, { "reference_url": "http://secunia.com/advisories/32232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32232" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html" }, { "reference_url": "http://www.securityfocus.com/bid/31621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31621" }, { "reference_url": "http://www.securitytracker.com/id?1021002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021002" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2760" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463995", "reference_id": "463995", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463995" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3829", "reference_id": "CVE-2008-3829", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3829" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911", "reference_id": "RHSA-2008:0911", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0911" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924", "reference_id": "RHSA-2008:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0924" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3829" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kvba-wgcs-xbd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87147?format=api", "vulnerability_id": "VCID-nkcc-sjac-dkcn", "summary": "Condor: Multiple format string flaws", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4930", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27076", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27116", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27152", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26944", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27013", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27058", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27061", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27017", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2696", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2697", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2691", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26862", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26854", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26789", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2664", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26707", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26755", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26678", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26696", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26778", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4930" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=759548", "reference_id": "759548", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=759548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0099", "reference_id": "RHSA-2012:0099", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0099" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0100", "reference_id": "RHSA-2012:0100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0100" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4930" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nkcc-sjac-dkcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261872?format=api", "vulnerability_id": "VCID-q7ww-nrcw-zkcn", "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45104", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3035", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30426", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30239", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30299", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30334", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30338", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30294", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30245", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.3026", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30242", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30197", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30133", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30018", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29942", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29808", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29879", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29888", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29818", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29838", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.29914", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45104" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-45104" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q7ww-nrcw-zkcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86938?format=api", "vulnerability_id": "VCID-t7ft-uyts-kbgc", "summary": "condor: privilege escalation via jobs submitted to the standard universe (CONDOR-2012-0003)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5390", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83054", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.8307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83084", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83082", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83107", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83114", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.8313", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83124", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.8312", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83158", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83161", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83184", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83191", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83199", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83223", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83244", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83264", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83265", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83281", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83314", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-5390" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=894481", "reference_id": "894481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=894481" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-5390" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t7ft-uyts-kbgc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86967?format=api", "vulnerability_id": "VCID-t9j5-gkyc-gbhw", "summary": "condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0564.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0564.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0565.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0565.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4462", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71891", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71659", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71683", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71696", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71707", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.7173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71714", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.7174", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71777", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71782", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71788", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71773", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71806", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71839", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71805", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00686", "scoring_system": "epss", "scoring_elements": "0.71833", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4462" }, { "reference_url": "https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84", "reference_id": "", "reference_type": "", "scores": [], "url": "https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=860850", "reference_id": "860850", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=860850" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4462", "reference_id": "CVE-2012-4462", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0564", "reference_id": "RHSA-2013:0564", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0564" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0565", "reference_id": "RHSA-2013:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0565" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-4462" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/132019?format=api", "vulnerability_id": "VCID-w4bg-xh3m-8qcb", "summary": "The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5136", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70108", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.7012", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70135", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70159", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70175", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70202", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70254", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70261", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.7026", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70235", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70277", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70311", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70279", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70306", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00625", "scoring_system": "epss", "scoring_elements": "0.70356", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-5136" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-5136" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w4bg-xh3m-8qcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88329?format=api", "vulnerability_id": "VCID-x9xb-pzmk-zuch", "summary": "condor: buffer overflow in lookup_macro", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3828", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43769", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.4389", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43935", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43887", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43938", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.4394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43958", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43925", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.4391", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43972", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43895", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43846", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43849", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43768", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43642", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43717", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43735", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43672", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43702", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3828" }, { "reference_url": "http://secunia.com/advisories/32189", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32189" }, { "reference_url": "http://secunia.com/advisories/32193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32193" }, { "reference_url": "http://secunia.com/advisories/32232", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32232" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html" }, { "reference_url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0911.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0924.html" }, { "reference_url": "http://www.securityfocus.com/bid/31621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31621" }, { "reference_url": "http://www.securitytracker.com/id?1021002", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021002" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2760", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2760" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=463990", "reference_id": "463990", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=463990" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3828", "reference_id": "CVE-2008-3828", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3828" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0911", "reference_id": "RHSA-2008:0911", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0911" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0924", "reference_id": "RHSA-2008:0924", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0924" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3828" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x9xb-pzmk-zuch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261870?format=api", "vulnerability_id": "VCID-ztyg-r17a-mkfu", "summary": "An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45103", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51517", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51569", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51556", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.5161", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51606", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51634", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51618", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51646", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51597", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51563", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51507", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51601", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51562", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51591", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51671", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45103" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582860?format=api", "purl": "pkg:deb/debian/condor@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582307?format=api", "purl": "pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582308?format=api", "purl": "pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1108314?format=api", "purl": "pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-45103" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyg-r17a-mkfu" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie" }