Search criteria
15 vulnerabilities found for boinc_client by universityofcalifornia
FKIE_CVE-2013-2018
Vulnerability from fkie_nvd - Published: 2020-02-20 00:15 - Updated: 2025-07-08 17:31
Severity ?
Summary
Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/04/28/3 | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/04/29/11 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/04/28/3 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/04/29/11 | Mailing List, Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| universityofcalifornia | boinc_client | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A050C594-976D-4492-8DFA-B4BAFCDCF08A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en BOINC, permiten a atacantes remotos ejecutar comandos SQL arbitrarios por medio de vectores no especificados."
}
],
"id": "CVE-2013-2018",
"lastModified": "2025-07-08T17:31:12.700",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-02-20T00:15:10.520",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-7386
Vulnerability from fkie_nvd - Published: 2014-06-02 15:55 - Updated: 2025-07-08 17:26
Severity ?
Summary
Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| universityofcalifornia | boinc_client | 7.2.33 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "4DC297C0-068D-4168-AA30-30475C89BC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
},
{
"lang": "es",
"value": "Vulnerabilidad de cadena de formato en la funci\u00f3n PROJECT::write_account_file en client/cs_account.cpp en BOINC, posiblemente 7.2.33, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de especificadores de cadena de formato en el art\u00edculo gui_urls en un archivo de cuenta."
}
],
"id": "CVE-2013-7386",
"lastModified": "2025-07-08T17:26:58.807",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-06-02T15:55:11.060",
"references": [
{
"source": "cve@mitre.org",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-134"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-2298
Vulnerability from fkie_nvd - Published: 2014-06-02 15:55 - Updated: 2025-07-08 17:33
Severity ?
Summary
Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "72D08712-08B8-4CF8-816E-0245492E6A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E2B388-8839-49BA-97D5-1178C190E61D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "81EA0FC1-DF55-4B4E-9FDB-D5B478CFB788",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C1A539-41E7-48A1-8C13-50D9F8B59503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "97638D84-2429-4BDE-B01C-5F54A9C8BB57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "50E647A8-728B-4671-BC61-CC277C86BA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "169FD74C-CCB4-47BF-AD8F-EEF1D108BE8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "91AAD86A-7321-4409-A09D-32F68AFCFA9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE22BDA-185D-4BDB-A251-F2C264E443B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB51A05-4432-41FF-A644-FBF2E15C02A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "39130CDF-67C4-4F83-8131-FA61A09D15C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "98714E3B-3623-45F3-B110-93E338B06635",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "31CD8873-B877-49A4-B8EB-ED600F63FE54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "FD3E307E-456F-43ED-AFFD-EB76630EF3D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "DE83D7BC-EAAB-4AD0-B106-05C46A14A97A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3FD542-1C90-4483-AD0A-07CD828F6D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "094DC9ED-6399-48A8-8162-4DF8B592CD5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "97C2CD23-2471-436F-8F2F-C057577D8606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "9D07FE6F-DC48-4CDC-A762-19A0F18CA927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "5617F6BE-1096-44D4-850D-23A50410CAFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "C62D6475-A03A-4592-9728-4C86F80F55C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "42FEC49C-7D3A-4768-B2A9-5D684BDF02C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB85E0E-A47B-4F56-A5C9-50322B804077",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "963F5586-0EEA-4D08-9D0B-1477C7A18ADF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "CC1C1843-6DF2-44C7-96D1-2222CAAC3D90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0160A9-BD01-48B3-B364-95D3CADDD325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "6A07F468-DB9D-4EF5-AA92-03198D86458C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "1468E038-BBB7-438F-90A8-7AE0B2213580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "9005FAA7-44E5-48B5-A821-76DF51AA072A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "52CE30BA-D2B5-45B9-B172-8FCC33B01875",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "13622311-0274-4320-AC0D-1DFC56ACD6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "3E001BA5-C287-4DAF-AD75-B13614F40138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "061F470B-4258-4EDA-A455-94406A5AA49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "4144ABFA-30D6-403F-B06C-EB6FD3FA5D31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "789E9948-4BD1-49D4-8CB8-A7FC461A3499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "4C83F53F-CC0C-4E8B-A370-B126136D69FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D4B4A0-EAC5-44CD-A3B1-846CF8D24253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.46:*:*:*:*:*:*:*",
"matchCriteriaId": "047B4BE2-7645-4462-94C8-75CF3D254F67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.47:*:*:*:*:*:*:*",
"matchCriteriaId": "AED4DBC1-C5A9-48CB-9A16-DAF82AF1C408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B92EA1-E5B4-4033-B9F7-4D5DB2185D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.49:*:*:*:*:*:*:*",
"matchCriteriaId": "6C57DFB4-D4A4-4984-8F09-B3C42F4F6AD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.50:*:*:*:*:*:*:*",
"matchCriteriaId": "09D4354C-67BA-4528-BB36-A6DCA387C215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "B2ECDD36-F19B-4F4B-A989-73C28B25FBD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.52:*:*:*:*:*:*:*",
"matchCriteriaId": "F28D4C39-F6EB-4FB0-B778-463DB06C6B16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.53:*:*:*:*:*:*:*",
"matchCriteriaId": "F7731646-7388-4CCE-8922-FC23970B7612",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "463EEF45-F3D9-4C84-8732-F2AB09A3F4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.55:*:*:*:*:*:*:*",
"matchCriteriaId": "6DAC243F-9275-48A6-B3F7-C680BCC9BFC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.56:*:*:*:*:*:*:*",
"matchCriteriaId": "E20BE840-BCA7-41FA-BF6D-6B5ED81709C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "4701F032-AE35-4316-AAFF-D95FE8B54FCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.58:*:*:*:*:*:*:*",
"matchCriteriaId": "D0297F2F-9634-4281-969A-347F700F2C23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.59:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D61390-9B3A-48A0-9370-5DDBB3506FEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.60:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC494F-3064-4B5B-AD0B-CC5D60EC3EA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.61:*:*:*:*:*:*:*",
"matchCriteriaId": "C5036D79-54AE-41F5-A6C4-9E1375CE838A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.62:*:*:*:*:*:*:*",
"matchCriteriaId": "C2017E6D-8600-4699-89B3-97252B21581A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.63:*:*:*:*:*:*:*",
"matchCriteriaId": "A05D1BE7-2F16-44AE-B6D4-388764B9D3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.64:*:*:*:*:*:*:*",
"matchCriteriaId": "B7057951-2340-4A56-8A15-8A9BC65F630A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.65:*:*:*:*:*:*:*",
"matchCriteriaId": "20A663AA-80B6-40A1-ABA1-5A969F036425",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.66:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC0811F-3232-421C-ACF9-835D9B3B4EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.67:*:*:*:*:*:*:*",
"matchCriteriaId": "7C1801E1-7DDD-40BD-B9F5-E98AC3B1E2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.68:*:*:*:*:*:*:*",
"matchCriteriaId": "BE4896AF-86D9-4475-B80D-B2F6080873CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.69:*:*:*:*:*:*:*",
"matchCriteriaId": "57033EA4-7921-4DC5-A6CF-736A81123F85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.70:*:*:*:*:*:*:*",
"matchCriteriaId": "2373784B-C25C-4EB4-A19B-EDC870EE40EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.71:*:*:*:*:*:*:*",
"matchCriteriaId": "2801EBD2-26E5-40D8-99F6-D38AC629A925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.72:*:*:*:*:*:*:*",
"matchCriteriaId": "858694D8-1B83-4072-803D-1A6E0C3C7D76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.73:*:*:*:*:*:*:*",
"matchCriteriaId": "A13E07B1-2FB7-4CE8-81F4-B66EEC9624C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.74:*:*:*:*:*:*:*",
"matchCriteriaId": "2BDA95B4-6876-4580-8D30-BC1F61259F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.75:*:*:*:*:*:*:*",
"matchCriteriaId": "76C85ABB-4EA4-4E88-A836-33B738DAAB5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.76:*:*:*:*:*:*:*",
"matchCriteriaId": "2B2FA70D-C9D8-46F9-ABE8-9227DFEEE082",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.77:*:*:*:*:*:*:*",
"matchCriteriaId": "701DD561-65EB-406E-A741-2EE9690EA706",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.78:*:*:*:*:*:*:*",
"matchCriteriaId": "404C970E-CD43-4E9B-B4D1-F8FB00ED3CFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.79:*:*:*:*:*:*:*",
"matchCriteriaId": "CDA61FA5-AA09-459E-9366-2A27A97FE01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.80:*:*:*:*:*:*:*",
"matchCriteriaId": "7C70BA88-12A0-4278-A4B5-9A97F11CAC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AA43F1C8-4F6C-4B98-B17B-B719877D152A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD7A49C-F4A0-4184-9989-A881F04C5CF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE56322-9565-4816-9667-10BD07CC67AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "70EBAE6D-3431-4E12-9B5D-C7CE4F1BA20E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2961E7-7240-4E82-9EAB-7179844BED1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "96D50DC2-1B61-4B97-AC74-93A568BFC40B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "778D492F-1930-43EB-8D00-8B6709B66F24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "415EB17A-2F00-42A3-AD38-2D7FF7B61B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA58FE4-4459-4C54-B752-7443804933F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "63CF77D9-78C4-4B4A-B4EA-1D058E8EE3C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C591FDF8-285B-4619-805A-1EBC14E6A12C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "89762343-F054-4405-9B10-9D7D4D5B2E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F5A6216-637A-4079-8ADD-A280CDEE93B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "270C3996-8DE7-4C5B-B9F6-ACADAA8E29B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "43BC1ACB-D2C2-432D-94D0-508F167E9D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D8EAFF-8A32-452D-B6E4-B616632939A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "AC0D71F1-14FD-48E4-8080-86B5BD06E30B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "3444FEE8-52CD-40B7-AB35-5281DDFB85DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BE5B33-9C19-4255-B5EF-419999BE7633",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7F0EFA-ECA4-41C2-8CA7-8CE4676DCC8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "887664ED-6C06-4062-8E6D-2549F358350E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "080DABAF-9700-43CA-8D5E-AE8FFF11BBF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7EB90FB-D2D7-45B1-9A0D-FF9FA054889C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B815A1C2-9D23-485D-8687-4725E56E70D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "830A4FE0-B923-4B00-8B03-93AB0C703F47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA1FF50-0858-451E-A301-22AD6E048328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "96E523E1-A0AF-493A-B0A2-1107F1EEEB9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D2CB1BDF-5AEE-4E8F-95DD-8DAC18731691",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B9320EBA-E9DC-4954-ADAC-6F91A2E47525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "17FE08E4-5304-4853-8685-63DBFCCA0BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "66B5A49B-BBE2-402A-B7F4-7081116F4A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AB443A80-98A3-4BF9-AB40-075F263150B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "3A33F67E-9BE2-43C2-976D-BF0600AADB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0C66739A-7265-4B19-AF9D-CAF6BE87616A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "C297FBED-C532-42BE-871B-C37CA35A2DB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2B53C8AD-C4A8-4ED2-A493-88A7844387AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "BB97852C-EADD-4625-9B42-47102496306A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5193A320-35F4-47AD-A959-8F401CCCC35E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B7587D83-5720-40A0-BF93-B83961D557A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "72F63A3B-E311-4254-9F12-79F958CF87A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3F7CFA3B-2023-4D3E-A588-7139215B3C14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "98CFC8AC-E81F-48A8-A0D2-D69EC7FE68FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5B346F-4424-43C1-94C0-002E753564AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "880AF08E-1B23-4ED7-B423-285931F3EA60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A61BFF20-32F1-4AB0-8530-6FBE3A281EA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "623D9C4C-0363-42DF-86C4-B08363FDC66E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "50661394-6F1C-4BAE-9C9B-2A942D00A4C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "8518678E-AB01-40D6-912C-C04353CB89A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "E3EE8C03-C5C2-4DBF-8255-B4F0731163B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "DC9D27FB-D232-45E4-AB38-77AC5DC8A4AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "DD2057F8-052F-4617-A22F-374D0FBD0B76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D54458-49FD-41F1-8EAF-8A8E65844967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB21B9F-0C5B-4282-A937-3B1E60E4E712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "04CC438E-C05B-4C91-99A0-EA800CEF5915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "4DC297C0-068D-4168-AA30-30475C89BC33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.34:*:*:*:*:*:*:*",
"matchCriteriaId": "EBCAEEA3-F7A9-4C8D-93D0-C42525ED8BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.35:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A69D2C-1FAD-4957-9207-034179B9D193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.36:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A1E302-1B6D-4B56-A81F-467447E3CB11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.37:*:*:*:*:*:*:*",
"matchCriteriaId": "4B2F3F21-55F8-4BE4-89BF-2B0F015B8C1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.38:*:*:*:*:*:*:*",
"matchCriteriaId": "6462918C-3D6F-4974-B113-3C9652C90B7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.39:*:*:*:*:*:*:*",
"matchCriteriaId": "A22F41F5-2CFD-404B-9D35-43DCC29C8C2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "1F61206A-340B-4CA1-A3CE-330DF31AF4B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "C984AFFC-5D04-4995-8D8A-DA75F64DEECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "96C7B30A-3929-490C-83F7-39AB8CA36B45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2D613F-75BB-4951-9857-F5CE21EF97B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.44:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF2B954-E0BD-4D97-BC91-91A5FECFA687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.47:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3D9A90-8AB6-45DD-9588-668C74D06AE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1ED66C-FDEB-4474-AE38-B71DA8B1B0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "94FA574F-F522-4EA0-AAA7-EADFA7DA958B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1452A45-D40D-46A7-A6F8-5871B0B108B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "738ECB72-6F01-408A-B3B8-2743673EF9C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8130E38D-0450-4531-99C0-00B7B5538287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "645823B6-4412-4079-888D-F07872074E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E2FBD866-B8B3-4257-99B7-1F0834AE44B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5144BB6C-C9F3-4E67-8823-ED53D80FCC9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "30A53F8F-CDC5-4938-B4F3-C7FD9A53E5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD41F1D-E95C-4CC3-ACB6-827CD1D698A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0C0DF10E-527E-460C-88C6-67C1BC674F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8066AC-1A95-4E43-B55D-0A8B0D3EB911",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "84DB7AD3-E414-42ED-BED2-770C98032A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E0A3D6EF-9D3B-4FAA-9A40-4C42F01A42C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC84068-0120-4E22-AC14-6F629B5FC197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "555AE9E7-67E2-4F17-BACE-FB3B4E5BAE2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "A05D64FE-DEA1-4C58-A435-82B4622452F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "862E53E4-5EC4-400E-914C-0DC5E4B0FC83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "99651D27-8491-497C-99AC-F36B9085EE80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "B45F107D-2ED6-4E15-A44C-59D26079FE1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de buffer basado en pila en el analizador XML en BOINC 7.x permiten a atacantes tener impacto no especificado a trav\u00e9s de un archivo XML manipulado, relacionado con el planificador."
}
],
"id": "CVE-2013-2298",
"lastModified": "2025-07-08T17:33:43.070",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-06-02T15:55:10.060",
"references": [
{
"source": "cve@mitre.org",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/53192"
},
{
"source": "cve@mitre.org",
"url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/59539"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/53192"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/59539"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-2019
Vulnerability from fkie_nvd - Published: 2014-06-02 15:55 - Updated: 2025-07-08 17:33
Severity ?
Summary
Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| universityofcalifornia | boinc_client | 6.10.58 | |
| universityofcalifornia | boinc_client | 6.12.34 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.10.58:*:*:*:*:*:*:*",
"matchCriteriaId": "51305A0A-F2A8-4A87-B8A3-BFC4CA2186A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.12.34:*:*:*:*:*:*:*",
"matchCriteriaId": "50880F6C-D23E-4E75-92DD-A686841C0CC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements."
},
{
"lang": "es",
"value": "Desbordamiento de buffer basado en pila en BOINC 6.10.58 y 6.12.34 permite a atacantes remotos tener impacto no especificado a trav\u00e9s de m\u00faltiples elementos file_signature."
}
],
"id": "CVE-2013-2019",
"lastModified": "2025-07-08T17:33:43.070",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-06-02T15:55:09.700",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/59565"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/59565"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-5280
Vulnerability from fkie_nvd - Published: 2014-06-02 15:55 - Updated: 2025-07-08 17:33
Severity ?
Summary
Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| universityofcalifornia | boinc_client | 6.13.0 | |
| universityofcalifornia | boinc_client | 6.13.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01464AAC-49E5-4224-9C0E-E7F7C46CD11D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE986A5-B8D0-460D-8172-8EA0D58060D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de buffer basado en pila en BOINC 6.13.x permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un trickle-up largo hacia (1) client/cs_trickle.cpp o (2) db/db_base.cpp."
}
],
"id": "CVE-2011-5280",
"lastModified": "2025-07-08T17:33:43.070",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-06-02T15:55:07.807",
"references": [
{
"source": "cve@mitre.org",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
},
{
"source": "cve@mitre.org",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2013-2018 (GCVE-0-2013-2018)
Vulnerability from cvelistv5 – Published: 2020-02-19 23:40 – Updated: 2024-08-06 15:20
VLAI?
Summary
Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- SQL Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:20:37.356Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "BOINC",
"vendor": "BOINC",
"versions": [
{
"status": "affected",
"version": "possibly 7.x and earlier"
}
]
}
],
"datePublic": "2013-03-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "SQL Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-19T23:40:32",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2018",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BOINC",
"version": {
"version_data": [
{
"version_value": "possibly 7.x and earlier"
}
]
}
}
]
},
"vendor_name": "BOINC"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.openwall.com/lists/oss-security/2013/04/28/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "http://www.openwall.com/lists/oss-security/2013/04/29/11",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-2018",
"datePublished": "2020-02-19T23:40:32",
"dateReserved": "2013-02-19T00:00:00",
"dateUpdated": "2024-08-06T15:20:37.356Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2019 (GCVE-0-2013-2019)
Vulnerability from cvelistv5 – Published: 2014-06-02 15:00 – Updated: 2024-08-06 15:20
VLAI?
Summary
Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:20:37.426Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "59565",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/59565"
},
{
"name": "boinc-cve20132019-bo(83930)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
},
{
"name": "[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-04-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "59565",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/59565"
},
{
"name": "boinc-cve20132019-bo(83930)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
},
{
"name": "[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-2019",
"datePublished": "2014-06-02T15:00:00",
"dateReserved": "2013-02-19T00:00:00",
"dateUpdated": "2024-08-06T15:20:37.426Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5280 (GCVE-0-2011-5280)
Vulnerability from cvelistv5 – Published: 2014-06-02 15:00 – Updated: 2024-09-17 04:14
VLAI?
Summary
Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:30:47.033Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-06-02T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5280",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7",
"refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
},
{
"name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=5b04b249db166ec38c1ee99a9eadcaa300c0f454",
"refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5280",
"datePublished": "2014-06-02T15:00:00Z",
"dateReserved": "2014-06-02T00:00:00Z",
"dateUpdated": "2024-09-17T04:14:28.124Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-7386 (GCVE-0-2013-7386)
Vulnerability from cvelistv5 – Published: 2014-06-02 15:00 – Updated: 2024-09-16 17:47
VLAI?
Summary
Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:09:16.408Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
},
{
"name": "FEDORA-2013-23734",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
},
{
"name": "FEDORA-2013-23720",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-06-02T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
},
{
"name": "FEDORA-2013-23734",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
},
{
"name": "FEDORA-2013-23720",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7386",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=957795",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
},
{
"name": "FEDORA-2013-23734",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9",
"refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
},
{
"name": "FEDORA-2013-23720",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-7386",
"datePublished": "2014-06-02T15:00:00Z",
"dateReserved": "2014-06-02T00:00:00Z",
"dateUpdated": "2024-09-16T17:47:59.746Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2298 (GCVE-0-2013-2298)
Vulnerability from cvelistv5 – Published: 2014-06-02 15:00 – Updated: 2024-08-06 15:36
VLAI?
Summary
Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:36:46.433Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "FEDORA-2013-23734",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"name": "53192",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/53192"
},
{
"name": "boinc-cve20132298-bo(83931)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
},
{
"name": "[boinc_projects] 20130227 security patches for scheduler",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
},
{
"name": "FEDORA-2013-23720",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"name": "59539",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/59539"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-02-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "FEDORA-2013-23734",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"name": "53192",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/53192"
},
{
"name": "boinc-cve20132298-bo(83931)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
},
{
"name": "[boinc_projects] 20130227 security patches for scheduler",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
},
{
"name": "FEDORA-2013-23720",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"name": "59539",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/59539"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-2298",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "FEDORA-2013-23734",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"name": "53192",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53192"
},
{
"name": "boinc-cve20132298-bo(83931)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
},
{
"name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b",
"refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b"
},
{
"name": "[boinc_projects] 20130227 security patches for scheduler",
"refsource": "MLIST",
"url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
},
{
"name": "FEDORA-2013-23720",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"name": "59539",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59539"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-2298",
"datePublished": "2014-06-02T15:00:00",
"dateReserved": "2013-03-04T00:00:00",
"dateUpdated": "2024-08-06T15:36:46.433Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2018 (GCVE-0-2013-2018)
Vulnerability from nvd – Published: 2020-02-19 23:40 – Updated: 2024-08-06 15:20
VLAI?
Summary
Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- SQL Injection
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:20:37.356Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "BOINC",
"vendor": "BOINC",
"versions": [
{
"status": "affected",
"version": "possibly 7.x and earlier"
}
]
}
],
"datePublic": "2013-03-11T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "SQL Injection",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-19T23:40:32",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-2018",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "BOINC",
"version": {
"version_data": [
{
"version_value": "possibly 7.x and earlier"
}
]
}
}
]
},
"vendor_name": "BOINC"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "SQL Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.openwall.com/lists/oss-security/2013/04/28/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "http://www.openwall.com/lists/oss-security/2013/04/29/11",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-2018",
"datePublished": "2020-02-19T23:40:32",
"dateReserved": "2013-02-19T00:00:00",
"dateUpdated": "2024-08-06T15:20:37.356Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2019 (GCVE-0-2013-2019)
Vulnerability from nvd – Published: 2014-06-02 15:00 – Updated: 2024-08-06 15:20
VLAI?
Summary
Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:20:37.426Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "59565",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/59565"
},
{
"name": "boinc-cve20132019-bo(83930)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
},
{
"name": "[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-04-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "59565",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/59565"
},
{
"name": "boinc-cve20132019-bo(83930)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
},
{
"name": "[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-2019",
"datePublished": "2014-06-02T15:00:00",
"dateReserved": "2013-02-19T00:00:00",
"dateUpdated": "2024-08-06T15:20:37.426Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5280 (GCVE-0-2011-5280)
Vulnerability from nvd – Published: 2014-06-02 15:00 – Updated: 2024-09-17 04:14
VLAI?
Summary
Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:30:47.033Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-06-02T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5280",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7",
"refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
},
{
"name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=5b04b249db166ec38c1ee99a9eadcaa300c0f454",
"refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5280",
"datePublished": "2014-06-02T15:00:00Z",
"dateReserved": "2014-06-02T00:00:00Z",
"dateUpdated": "2024-09-17T04:14:28.124Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-7386 (GCVE-0-2013-7386)
Vulnerability from nvd – Published: 2014-06-02 15:00 – Updated: 2024-09-16 17:47
VLAI?
Summary
Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:09:16.408Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
},
{
"name": "FEDORA-2013-23734",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
},
{
"name": "FEDORA-2013-23720",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-06-02T15:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
},
{
"name": "FEDORA-2013-23734",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
},
{
"name": "FEDORA-2013-23720",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7386",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=957795",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
},
{
"name": "FEDORA-2013-23734",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9",
"refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
},
{
"name": "FEDORA-2013-23720",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-7386",
"datePublished": "2014-06-02T15:00:00Z",
"dateReserved": "2014-06-02T00:00:00Z",
"dateUpdated": "2024-09-16T17:47:59.746Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-2298 (GCVE-0-2013-2298)
Vulnerability from nvd – Published: 2014-06-02 15:00 – Updated: 2024-08-06 15:36
VLAI?
Summary
Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:36:46.433Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "FEDORA-2013-23734",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"name": "53192",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/53192"
},
{
"name": "boinc-cve20132298-bo(83931)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
},
{
"name": "[boinc_projects] 20130227 security patches for scheduler",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
},
{
"name": "FEDORA-2013-23720",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"name": "59539",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/59539"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-02-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "FEDORA-2013-23734",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"name": "53192",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/53192"
},
{
"name": "boinc-cve20132298-bo(83931)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
},
{
"name": "[boinc_projects] 20130227 security patches for scheduler",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
},
{
"name": "FEDORA-2013-23720",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"name": "59539",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/59539"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-2298",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
},
{
"name": "FEDORA-2013-23734",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
},
{
"name": "53192",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53192"
},
{
"name": "boinc-cve20132298-bo(83931)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
},
{
"name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b",
"refsource": "CONFIRM",
"url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b"
},
{
"name": "[boinc_projects] 20130227 security patches for scheduler",
"refsource": "MLIST",
"url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
},
{
"name": "FEDORA-2013-23720",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
},
{
"name": "59539",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/59539"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-2298",
"datePublished": "2014-06-02T15:00:00",
"dateReserved": "2013-03-04T00:00:00",
"dateUpdated": "2024-08-06T15:36:46.433Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}