wisc CVE Vulnerabilities & Metrics

Focus on wisc vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About wisc Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with wisc. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total wisc CVEs: 11
Earliest CVE date: 05 Jul 2018, 20:29 UTC
Latest CVE date: 06 Apr 2022, 02:15 UTC

Latest CVE reference: CVE-2022-26110

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical wisc CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 6.57

Max CVSS: 9.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 8
7.0-8.9 1
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS wisc CVEs

These are the five CVEs with the highest CVSS scores for wisc, sorted by severity first and recency.

All CVEs for wisc

CVE-2022-26110 wisc vulnerability CVSS: 6.5 06 Apr 2022, 02:15 UTC

An issue was discovered in HTCondor 8.8.x before 8.8.16, 9.0.x before 9.0.10, and 9.1.x before 9.6.0. When a user authenticates to an HTCondor daemon via the CLAIMTOBE method, the user can then impersonate any entity when issuing additional commands to that daemon.

CVE-2021-45104 wisc vulnerability CVSS: 5.8 06 Apr 2022, 02:15 UTC

An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker who can capture HTCondor network data can interfere with users' jobs and data.

CVE-2021-45103 wisc vulnerability CVSS: 5.5 06 Apr 2022, 01:15 UTC

An issue was discovered in HTCondor 9.0.x before 9.0.10 and 9.1.x before 9.5.1. An attacker can access files stored in S3 cloud storage that a user has asked HTCondor to transfer.

CVE-2021-45102 wisc vulnerability CVSS: 6.5 16 Dec 2021, 05:15 UTC

An issue was discovered in HTCondor 9.0.x before 9.0.4 and 9.1.x before 9.1.2. When authenticating to an HTCondor daemon using a SciToken, a user may be granted authorizations beyond what the token should allow.

CVE-2021-45101 wisc vulnerability CVSS: 5.5 16 Dec 2021, 05:15 UTC

An issue was discovered in HTCondor before 8.8.15, 9.0.x before 9.0.4, and 9.1.x before 9.1.2. Using standard command-line tools, a user with only READ access to an HTCondor SchedD or Collector daemon can discover secrets that could allow them to control other users' jobs and/or read their data.

CVE-2021-25312 wisc vulnerability CVSS: 6.5 27 Jan 2021, 16:15 UTC

HTCondor before 8.9.11 allows a user to submit a job as another user on the system, because of a flaw in the IDTOKENS authentication method.

CVE-2021-25311 wisc vulnerability CVSS: 9.0 27 Jan 2021, 16:15 UTC

condor_credd in HTCondor before 8.9.11 allows Directory Traversal outside the SEC_CREDENTIAL_DIRECTORY_OAUTH directory, as demonstrated by creating a file under /etc that will later be executed by root.

CVE-2019-18823 wisc vulnerability CVSS: 7.5 27 Apr 2020, 15:15 UTC

HTCondor up to and including stable series 8.8.6 and development series 8.9.4 has Incorrect Access Control. It is possible to use a different authentication method to submit a job than the administrator has specified. If the administrator has configured the READ or WRITE methods to include CLAIMTOBE, then it is possible to impersonate another user to the condor_schedd. (For example to submit or remove jobs)

CVE-2014-8126 wisc vulnerability CVSS: 6.5 31 Jan 2020, 22:15 UTC

The scheduler in HTCondor before 8.2.6 allows remote authenticated users to execute arbitrary code.

CVE-2012-3490 wisc vulnerability CVSS: 9.0 09 Jan 2020, 21:15 UTC

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.

CVE-2017-16816 wisc vulnerability CVSS: 4.0 05 Jul 2018, 20:29 UTC

The condor_schedd component in HTCondor before 8.6.8 and 8.7.x before 8.7.5 allows remote authenticated users to cause a denial of service (daemon crash) by leveraging use of GSI and VOMS extensions.