Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gqg4-4wpq-c69h

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The command_give_request_ad function in condor_startd.V6/command.cpp Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 allows remote attackers to obtain sensitive information, and possibly control or start arbitrary jobs, via a ClassAd request to the condor_startd port, which leaks the ClaimId.

The command_give_request_ad function in condor_startd.V6/command.cpp Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 allows remote attackers to obtain sensitive information, and possibly control or start arbitrary jobs, via a ClassAd request to the condor_startd port, which leaks the ClaimId.

EPSS

Процентиль: 73%
0.00765
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 13 лет назад

The command_give_request_ad function in condor_startd.V6/command.cpp Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 allows remote attackers to obtain sensitive information, and possibly control or start arbitrary jobs, via a ClassAd request to the condor_startd port, which leaks the ClaimId.

redhat
больше 13 лет назад

The command_give_request_ad function in condor_startd.V6/command.cpp Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 allows remote attackers to obtain sensitive information, and possibly control or start arbitrary jobs, via a ClassAd request to the condor_startd port, which leaks the ClaimId.

nvd
больше 13 лет назад

The command_give_request_ad function in condor_startd.V6/command.cpp Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 allows remote attackers to obtain sensitive information, and possibly control or start arbitrary jobs, via a ClassAd request to the condor_startd port, which leaks the ClaimId.

debian
больше 13 лет назад

The command_give_request_ad function in condor_startd.V6/command.cpp C ...

EPSS

Процентиль: 73%
0.00765
Низкий

Дефекты

CWE-200