Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
condor project condor vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2012-5390
The standard universe shadow (condor_shadow.std) component in Condor 7.7.3 up to and including 7.7.6, 7.8.0 prior to 7.8.5, and 7.9.0 does no properly check privileges, which allows remote malicious users to gain privileges via a crafted standard universe job.
Condor Project Condor 7.9.0
Condor Project Condor 7.8.4
Condor Project Condor 7.8.3
Condor Project Condor 7.8.1
Condor Project Condor 7.8.0
Condor Project Condor 7.8.2
Condor Project Condor 7.7.3
Condor Project Condor 7.7.6
Condor Project Condor 7.7.5
Condor Project Condor 7.7.4
10
CVSSv2
CVE-2012-5197
Multiple unspecified vulnerabilities in Condor 7.6.x prior to 7.6.10 and 7.8.x prior to 7.8.4 have unknown impact and attack vectors related to "error checking of system calls."
Condor Project Condor 7.6.1
Condor Project Condor 7.6.3
Condor Project Condor 7.6.9
Condor Project Condor 7.6.0
Condor Project Condor 7.6.5
Condor Project Condor 7.6.6
Condor Project Condor 7.6.4
Condor Project Condor 7.6.7
Condor Project Condor 7.6.2
Condor Project Condor 7.6.8
Condor Project Condor 7.8.3
Condor Project Condor 7.8.1
Condor Project Condor 7.8.0
Condor Project Condor 7.8.2
10
CVSSv2
CVE-2012-5196
Multiple buffer overflows in Condor 7.6.x prior to 7.6.10 and 7.8.x prior to 7.8.4 have unknown impact and attack vectors.
Condor Project Condor 7.6.1
Condor Project Condor 7.6.3
Condor Project Condor 7.6.9
Condor Project Condor 7.6.0
Condor Project Condor 7.6.5
Condor Project Condor 7.6.6
Condor Project Condor 7.8.3
Condor Project Condor 7.8.1
Condor Project Condor 7.6.4
Condor Project Condor 7.8.0
Condor Project Condor 7.6.7
Condor Project Condor 7.6.2
Condor Project Condor 7.6.8
Condor Project Condor 7.8.2
10
CVSSv2
CVE-2012-3416
Condor prior to 7.8.2 allows remote malicious users to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
Condor Project Condor 7.1.4
Condor Project Condor 6.8.1
Condor Project Condor 7.2.3
Condor Project Condor
Condor Project Condor 7.1.3
Condor Project Condor 6.8.4
Condor Project Condor 7.1.0
Condor Project Condor 7.1.1
Condor Project Condor 7.0.0
Condor Project Condor 7.3.2
Condor Project Condor 7.02
Condor Project Condor 7.01
Condor Project Condor 7.2.1
Condor Project Condor 7.2.0
Condor Project Condor 7.4.1
Condor Project Condor 7.3.0
Condor Project Condor 6.8.9
Condor Project Condor 6.8.0
Condor Project Condor 7.0.6
Condor Project Condor 6.8.6
Condor Project Condor 7.00
Condor Project Condor 6.8.7
7.5
CVSSv2
CVE-2008-3424
Condor prior to 7.0.4 does not properly handle wildcards in the ALLOW_WRITE, DENY_WRITE, HOSTALLOW_WRITE, or HOSTDENY_WRITE configuration variables in authorization policy lists, which might allow remote malicious users to bypass intended access restrictions.
Condor Project Condor
Fedoraproject Fedora 9
7.2
CVSSv2
CVE-2008-3830
Condor prior to 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows malicious users to bypass intended access restrictions.
Condor Project Condor 6.8.1
Condor Project Condor 6.8.4
Condor Project Condor 7.0.0
Condor Project Condor
Condor Project Condor 6.8.9
Condor Project Condor 6.8.0
Condor Project Condor 6.8.6
Condor Project Condor 6.8.7
Condor Project Condor 6.8.3
Condor Project Condor 7.0.1
Condor Project Condor 7.0.2
Condor Project Condor 7.0.3
Condor Project Condor 6.8.5
Condor Project Condor 6.8.8
Condor Project Condor 6.8.2
6.5
CVSSv2
CVE-2009-4133
Condor 6.5.4 up to and including 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified j...
Condor Project Condor 6.5.4
Condor Project Condor 6.8.0
Condor Project Condor 6.8.1
Condor Project Condor 6.8.2
Condor Project Condor 6.8.3
Condor Project Condor 6.8.4
Condor Project Condor 6.8.5
Condor Project Condor 6.8.6
Condor Project Condor 6.8.7
Condor Project Condor 6.8.8
Condor Project Condor 6.8.9
Condor Project Condor 7.0.0
Condor Project Condor 7.0.1
Condor Project Condor 7.0.2
Condor Project Condor 7.0.3
Condor Project Condor 7.0.4
Condor Project Condor 7.0.5
Condor Project Condor 7.0.6
Condor Project Condor 7.1.0
Condor Project Condor 7.1.1
Condor Project Condor 7.1.2
Condor Project Condor 7.1.3
6.4
CVSSv2
CVE-2012-3492
The filesystem authentication (condor_io/condor_auth_fs.cpp) in Condor 7.6.x prior to 7.6.10 and 7.8.x prior to 7.8.4 uses authentication directories even when they have weak permissions, which allows remote malicious users to impersonate users by renaming a user's authentic...
Condor Project Condor 7.6.1
Condor Project Condor 7.6.3
Condor Project Condor 7.6.9
Condor Project Condor 7.6.0
Condor Project Condor 7.6.5
Condor Project Condor 7.6.6
Condor Project Condor 7.8.3
Condor Project Condor 7.8.1
Condor Project Condor 7.6.4
Condor Project Condor 7.8.0
Condor Project Condor 7.6.7
Condor Project Condor 7.6.2
Condor Project Condor 7.6.8
Condor Project Condor 7.8.2
5.8
CVSSv2
CVE-2012-3493
The command_give_request_ad function in condor_startd.V6/command.cpp Condor 7.6.x prior to 7.6.10 and 7.8.x prior to 7.8.4 allows remote malicious users to obtain sensitive information, and possibly control or start arbitrary jobs, via a ClassAd request to the condor_startd port,...
Condor Project Condor 7.6.1
Condor Project Condor 7.6.3
Condor Project Condor 7.6.9
Condor Project Condor 7.6.0
Condor Project Condor 7.6.5
Condor Project Condor 7.6.6
Condor Project Condor 7.8.3
Condor Project Condor 7.8.1
Condor Project Condor 7.6.4
Condor Project Condor 7.8.0
Condor Project Condor 7.6.7
Condor Project Condor 7.6.2
Condor Project Condor 7.6.8
Condor Project Condor 7.8.2
5
CVSSv2
CVE-2008-3829
Unspecified vulnerability in the condor_ schedd daemon in Condor prior to 7.0.5 allows malicious users to cause a denial of service (crash) via unknown vectors.
Condor Project Condor 6.8.1
Condor Project Condor 6.8.4
Condor Project Condor 7.0.0
Condor Project Condor
Condor Project Condor 6.8.9
Condor Project Condor 6.8.0
Condor Project Condor 6.8.6
Condor Project Condor 6.8.7
Condor Project Condor 6.8.3
Condor Project Condor 7.0.1
Condor Project Condor 7.0.2
Condor Project Condor 7.0.3
Condor Project Condor 6.8.5
Condor Project Condor 6.8.8
Condor Project Condor 6.8.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »