{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","type":"deb","namespace":"debian","name":"condor","version":"0","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"7.8.2~dfsg.1-1","latest_non_vulnerable_version":"25.8.2+dfsg-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/261869?format=json","vulnerability_id":"VCID-153e-ka9n-eydy","summary":"An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45102","reference_id":"","reference_type":"","scores":[{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56896","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56894","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56945","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56957","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56942","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56939","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56874","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56857","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56812","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56858","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00342","scoring_system":"epss","scoring_elements":"0.56918","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45102"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-45102"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-153e-ka9n-eydy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/244219?format=json","vulnerability_id":"VCID-1q6e-935y-puh5","summary":"HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25312","reference_id":"","reference_type":"","scores":[{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64216","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.6427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64272","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.6429","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64312","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64284","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64329","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00463","scoring_system":"epss","scoring_elements":"0.64373","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25312"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-25312"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1q6e-935y-puh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/337528?format=json","vulnerability_id":"VCID-8k4z-8t2z-a3ew","summary":"HTCondor Access Point before 25.3.1 allows an authenticated user to impersonate other users on the local machine by submitting a batch job. This is fixed in 24.12.14, 25.0.3, and 25.3.1. The earliest affected version is 24.7.3.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66433","reference_id":"","reference_type":"","scores":[{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05195","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0539","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05432","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05257","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0525","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.01002","published_at":"2026-04-29T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.01006","published_at":"2026-05-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.01003","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66433"},{"reference_url":"https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html","reference_id":"HTCONDOR-2025-0002.html","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-01T13:33:56Z/"}],"url":"https://htcondor.org/security/vulnerabilities/HTCONDOR-2025-0002.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2025-66433"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-8t2z-a3ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88328?format=json","vulnerability_id":"VCID-9ury-14he-1qbg","summary":"condor: users can run jobs with arbitrary owners","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3826.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3826","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22802","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23043","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22966","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22959","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22923","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22753","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22748","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22742","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22642","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22726","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3826"},{"reference_url":"http://secunia.com/advisories/32189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32189"},{"reference_url":"http://secunia.com/advisories/32193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32193"},{"reference_url":"http://secunia.com/advisories/32232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32232"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html"},{"reference_url":"http://www.securityfocus.com/bid/31621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31621"},{"reference_url":"http://www.securitytracker.com/id?1021002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021002"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2760","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463987","reference_id":"463987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463987"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3826","reference_id":"CVE-2008-3826","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3826"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0911","reference_id":"RHSA-2008:0911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0924","reference_id":"RHSA-2008:0924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0924"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3826"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ury-14he-1qbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87927?format=json","vulnerability_id":"VCID-ee1r-3kks-8uen","summary":"Condor: queue super user cannot drop privs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4133","reference_id":"","reference_type":"","scores":[{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80624","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80677","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.8069","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80716","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80719","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80746","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80777","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.80799","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01434","scoring_system":"epss","scoring_elements":"0.8082","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4133"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=544371","reference_id":"544371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=544371"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1688","reference_id":"RHSA-2009:1688","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1688"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1689","reference_id":"RHSA-2009:1689","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1689"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2009-4133"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ee1r-3kks-8uen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88331?format=json","vulnerability_id":"VCID-fdhn-w5fd-zuem","summary":"condor: allow or deny with overlapping netmasks may be ignored","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3830","reference_id":"","reference_type":"","scores":[{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17832","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17959","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17958","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.18035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1799","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.1794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17894","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17841","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17818","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17783","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17637","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17729","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3830"},{"reference_url":"http://secunia.com/advisories/32189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32189"},{"reference_url":"http://secunia.com/advisories/32193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32193"},{"reference_url":"http://secunia.com/advisories/32232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32232"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html"},{"reference_url":"http://www.securityfocus.com/bid/31621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31621"},{"reference_url":"http://www.securitytracker.com/id?1021002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021002"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2760","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463997","reference_id":"463997","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463997"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3830","reference_id":"CVE-2008-3830","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3830"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0911","reference_id":"RHSA-2008:0911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0924","reference_id":"RHSA-2008:0924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0924"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3830"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fdhn-w5fd-zuem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88407?format=json","vulnerability_id":"VCID-g86f-7ywp-sya5","summary":"condor: incorrect handling of wild cards in authorization lists","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3424","reference_id":"","reference_type":"","scores":[{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70869","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7067","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70728","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70763","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7077","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70748","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70801","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70811","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7081","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70792","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70833","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3424"},{"reference_url":"http://secunia.com/advisories/31284","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31284"},{"reference_url":"http://secunia.com/advisories/31423","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31423"},{"reference_url":"http://secunia.com/advisories/31459","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31459"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44063","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/44063"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00252.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#sec:New-7-0-4"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0814.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0814.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0816.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0816.html"},{"reference_url":"http://www.securityfocus.com/bid/30440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/30440"},{"reference_url":"http://www.securitytracker.com/id?1020646","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1020646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=457372","reference_id":"457372","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=457372"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3424","reference_id":"CVE-2008-3424","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3424"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0814","reference_id":"RHSA-2008:0814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0816","reference_id":"RHSA-2008:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0816"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3424"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g86f-7ywp-sya5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/244217?format=json","vulnerability_id":"VCID-jftp-4vmf-dyg1","summary":"condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25311","reference_id":"","reference_type":"","scores":[{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.85968","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.85979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.85995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.85994","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86023","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86038","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86076","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86075","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86094","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86116","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02768","scoring_system":"epss","scoring_elements":"0.86134","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25311"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-25311"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jftp-4vmf-dyg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88330?format=json","vulnerability_id":"VCID-kvba-wgcs-xbd7","summary":"condor: denial of service attack on Schedd via corrupt logfile","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3829","reference_id":"","reference_type":"","scores":[{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.7774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77773","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77757","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.7779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.778","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77836","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77835","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77829","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77869","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77894","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01076","scoring_system":"epss","scoring_elements":"0.77924","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3829"},{"reference_url":"http://secunia.com/advisories/32189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32189"},{"reference_url":"http://secunia.com/advisories/32193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32193"},{"reference_url":"http://secunia.com/advisories/32232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32232"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html"},{"reference_url":"http://www.securityfocus.com/bid/31621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31621"},{"reference_url":"http://www.securitytracker.com/id?1021002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021002"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2760","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463995","reference_id":"463995","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463995"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3829","reference_id":"CVE-2008-3829","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3829"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0911","reference_id":"RHSA-2008:0911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0924","reference_id":"RHSA-2008:0924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0924"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3829"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kvba-wgcs-xbd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87147?format=json","vulnerability_id":"VCID-nkcc-sjac-dkcn","summary":"Condor: Multiple format string flaws","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4930.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4930","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27076","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27116","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27152","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26944","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27058","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27017","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2697","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26862","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26789","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2664","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26707","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26755","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-4930"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=759548","reference_id":"759548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=759548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0099","reference_id":"RHSA-2012:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0100","reference_id":"RHSA-2012:0100","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0100"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2011-4930"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nkcc-sjac-dkcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/261872?format=json","vulnerability_id":"VCID-q7ww-nrcw-zkcn","summary":"An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45104","reference_id":"","reference_type":"","scores":[{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30239","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30299","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30334","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30338","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30294","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.3026","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30242","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30197","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.30018","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29942","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29808","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29879","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00116","scoring_system":"epss","scoring_elements":"0.29888","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45104"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-45104"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q7ww-nrcw-zkcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86938?format=json","vulnerability_id":"VCID-t7ft-uyts-kbgc","summary":"condor: privilege escalation via jobs submitted to the standard universe (CONDOR-2012-0003)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-5390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5390","reference_id":"","reference_type":"","scores":[{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83054","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.8307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83084","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83082","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.8313","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83124","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.8312","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83158","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83161","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83184","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83191","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83199","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83223","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83244","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01874","scoring_system":"epss","scoring_elements":"0.83264","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-5390"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=894481","reference_id":"894481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=894481"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-5390"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t7ft-uyts-kbgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86967?format=json","vulnerability_id":"VCID-t9j5-gkyc-gbhw","summary":"condor: DoS when removing jobs via jobcontrol.py when job id is in square brackets","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0564.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0564.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0565.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0565.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4462","reference_id":"","reference_type":"","scores":[{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71839","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71659","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71683","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.7173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71714","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.7174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71746","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71777","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71773","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71806","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4462"},{"reference_url":"https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84","reference_id":"","reference_type":"","scores":[],"url":"https://htcondor-git.cs.wisc.edu/?p=condor.git%3Ba=commitdiff%3Bh=8f9b304c4f6c0a98dafa61b2c0e4beb3b70e4c84"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=860850","reference_id":"860850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=860850"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_mrg:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4462","reference_id":"CVE-2012-4462","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0564","reference_id":"RHSA-2013:0564","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0564"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0565","reference_id":"RHSA-2013:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0565"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2012-4462"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t9j5-gkyc-gbhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/132019?format=json","vulnerability_id":"VCID-w4bg-xh3m-8qcb","summary":"The policy definition evaluator in Condor before 7.4.2 does not properly handle attributes in a WANT_SUSPEND policy that evaluate to an UNDEFINED state, which allows remote authenticated users to cause a denial of service (condor_startd exit) via a crafted job.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5136","reference_id":"","reference_type":"","scores":[{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70108","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.7012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70214","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70202","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70261","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.7026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70235","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70277","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70311","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5136"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2009-5136"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w4bg-xh3m-8qcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88329?format=json","vulnerability_id":"VCID-x9xb-pzmk-zuch","summary":"condor: buffer overflow in lookup_macro","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3828.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3828","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43735","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4389","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43938","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4394","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4391","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43972","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43895","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43849","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43642","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43717","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-3828"},{"reference_url":"http://secunia.com/advisories/32189","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32189"},{"reference_url":"http://secunia.com/advisories/32193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32193"},{"reference_url":"http://secunia.com/advisories/32232","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32232"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00264.html"},{"reference_url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.wisc.edu/condor/manual/v7.0/8_3Stable_Release.html#SECTION00931000000000000000"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0911.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0924.html"},{"reference_url":"http://www.securityfocus.com/bid/31621","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31621"},{"reference_url":"http://www.securitytracker.com/id?1021002","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021002"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2760","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2760"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=463990","reference_id":"463990","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=463990"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3828","reference_id":"CVE-2008-3828","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-3828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0911","reference_id":"RHSA-2008:0911","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0911"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0924","reference_id":"RHSA-2008:0924","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0924"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2008-3828"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x9xb-pzmk-zuch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/261870?format=json","vulnerability_id":"VCID-ztyg-r17a-mkfu","summary":"An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45103","reference_id":"","reference_type":"","scores":[{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51517","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51556","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5161","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51606","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51618","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51597","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51603","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51507","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51601","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45103"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582860?format=json","purl":"pkg:deb/debian/condor@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582307?format=json","purl":"pkg:deb/debian/condor@23.9.6%2Bdfsg-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@23.9.6%252Bdfsg-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582308?format=json","purl":"pkg:deb/debian/condor@25.7.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.7.2%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1108314?format=json","purl":"pkg:deb/debian/condor@25.8.2%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@25.8.2%252Bdfsg-1%3Fdistro=trixie"}],"aliases":["CVE-2021-45103"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ztyg-r17a-mkfu"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/condor@0%3Fdistro=trixie"}