Filtered by vendor Wisc
Subscribe
Search
Total
7 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2021-45101 | 1 Wisc | 1 Htcondor | 2023-08-08 | 5.5 MEDIUM | 8.1 HIGH |
| An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data. | |||||
| CVE-2021-45104 | 1 Wisc | 1 Htcondor | 2022-07-12 | 5.8 MEDIUM | 7.4 HIGH |
| An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data. | |||||
| CVE-2022-26110 | 1 Wisc | 1 Htcondor | 2022-05-23 | 6.5 MEDIUM | 8.8 HIGH |
| An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon. | |||||
| CVE-2021-45102 | 1 Wisc | 1 Htcondor | 2021-12-22 | 6.5 MEDIUM | 8.8 HIGH |
| An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow. | |||||
| CVE-2021-25312 | 1 Wisc | 1 Htcondor | 2021-02-04 | 6.5 MEDIUM | 8.8 HIGH |
| HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method. | |||||
| CVE-2014-8126 | 1 Wisc | 1 Htcondor | 2020-02-05 | 6.5 MEDIUM | 8.8 HIGH |
| The scheduler in HTCondor before 8.2.6 allows remote authenticated users to execute arbitrary code. | |||||
| CVE-2012-3490 | 1 Wisc | 1 Htcondor | 2020-01-29 | 9.0 HIGH | 8.8 HIGH |
| The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors. | |||||
