Vulnerabilities
Vulnerable Software
Condor Project:  >> Condor  Security Vulnerabilities
Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.
CVSS Score
10.0
EPSS Score
0.045
Published
2012-08-25
Condor 6.5.4 through 7.2.4, 7.3.x, and 7.4.0, as used in MRG, Grid for MRG, and Grid Execute Node for MRG, allows remote authenticated users to queue jobs as an arbitrary user, and thereby gain privileges, by using a Condor command-line tool to modify an unspecified job attribute.
CVSS Score
6.5
EPSS Score
0.014
Published
2009-12-23
Unspecified vulnerability in Condor before 7.0.5 allows attackers to execute jobs as other users via unknown vectors.
CVSS Score
4.6
EPSS Score
0.001
Published
2008-10-08
Stack-based buffer overflow in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors.
CVSS Score
4.6
EPSS Score
0.002
Published
2008-10-08
Unspecified vulnerability in the condor_ schedd daemon in Condor before 7.0.5 allows attackers to cause a denial of service (crash) via unknown vectors.
CVSS Score
5.0
EPSS Score
0.011
Published
2008-10-08
Condor before 7.0.5 does not properly handle when the configuration specifies overlapping netmasks in allow or deny rules, which causes the rule to be ignored and allows attackers to bypass intended access restrictions.
CVSS Score
7.2
EPSS Score
0.001
Published
2008-10-08
Condor before 7.0.4 does not properly handle wildcards in the ALLOW_WRITE, DENY_WRITE, HOSTALLOW_WRITE, or HOSTDENY_WRITE configuration variables in authorization policy lists, which might allow remote attackers to bypass intended access restrictions.
CVSS Score
7.5
EPSS Score
0.006
Published
2008-07-31


Contact Us

Shodan ® - All rights reserved