Lucene search

K
Condor ProjectCondor6.8.3

6 matches found

CVE
CVE
added 2008/10/08 10:0 p.m.68 views

CVE-2008-3828

Stack-based buffer overflow in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.

4.6CVSS7.7AI score0.00214EPSS
CVE
CVE
added 2009/12/23 6:30 p.m.43 views

CVE-2009-4133

Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute.

6.5CVSS6.2AI score0.01434EPSS
CVE
CVE
added 2008/10/08 10:0 p.m.41 views

CVE-2008-3830

Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.

7.2CVSS6.3AI score0.00057EPSS
CVE
CVE
added 2008/10/08 10:0 p.m.37 views

CVE-2008-3826

Unspecified vulnerability in Condor before 7.0.5 allows attackers to execute jobs as other users via unknown vectors.

4.6CVSS6.5AI score0.00077EPSS
CVE
CVE
added 2012/08/25 10:29 a.m.36 views

CVE-2012-3416

Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.

10CVSS7AI score0.04537EPSS
CVE
CVE
added 2008/10/08 10:0 p.m.30 views

CVE-2008-3829

Unspecified vulnerability in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) via unknown vectors.

5CVSS6.2AI score0.01076EPSS