Total vulnerabilities in the database
HTCondor 23.0.x before 23.0.22, 23.10.x before 23.10.22, 24.0.x before 24.0.6, and 24.6.x before 24.6.1 allows authenticated attackers to bypass authorization restrictions.
Software | From | Fixed in |
---|---|---|
wisc / htcondor | 23.10.1 | 23.10.22 |
wisc / htcondor | 23.0.0 | 23.0.22 |
wisc / htcondor | 24.0.1 | 24.0.6 |