Search criteria

15 vulnerabilities found for boinc_client by universityofcalifornia

FKIE_CVE-2013-2018

Vulnerability from fkie_nvd - Published: 2020-02-20 00:15 - Updated: 2025-07-08 17:31
Severity ?
Summary
Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Impacted products
Vendor Product Version
universityofcalifornia boinc_client -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A050C594-976D-4492-8DFA-B4BAFCDCF08A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en BOINC, permiten a atacantes remotos ejecutar comandos SQL arbitrarios por medio de vectores no especificados."
    }
  ],
  "id": "CVE-2013-2018",
  "lastModified": "2025-07-08T17:31:12.700",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-20T00:15:10.520",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-7386

Vulnerability from fkie_nvd - Published: 2014-06-02 15:55 - Updated: 2025-07-08 17:26

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC297C0-068D-4168-AA30-30475C89BC33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cadena de formato en la funci\u00f3n PROJECT::write_account_file en client/cs_account.cpp en BOINC, posiblemente 7.2.33, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de especificadores de cadena de formato en el art\u00edculo gui_urls en un archivo de cuenta."
    }
  ],
  "id": "CVE-2013-7386",
  "lastModified": "2025-07-08T17:26:58.807",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-06-02T15:55:11.060",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-2298

Vulnerability from fkie_nvd - Published: 2014-06-02 15:55 - Updated: 2025-07-08 17:33
Severity ?
Summary
Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler.
Impacted products
Vendor Product Version
universityofcalifornia boinc_client 7.0
universityofcalifornia boinc_client 7.0.1
universityofcalifornia boinc_client 7.0.2
universityofcalifornia boinc_client 7.0.3
universityofcalifornia boinc_client 7.0.5
universityofcalifornia boinc_client 7.0.6
universityofcalifornia boinc_client 7.0.7
universityofcalifornia boinc_client 7.0.8
universityofcalifornia boinc_client 7.0.9
universityofcalifornia boinc_client 7.0.10
universityofcalifornia boinc_client 7.0.11
universityofcalifornia boinc_client 7.0.12
universityofcalifornia boinc_client 7.0.13
universityofcalifornia boinc_client 7.0.14
universityofcalifornia boinc_client 7.0.15
universityofcalifornia boinc_client 7.0.16
universityofcalifornia boinc_client 7.0.17
universityofcalifornia boinc_client 7.0.18
universityofcalifornia boinc_client 7.0.19
universityofcalifornia boinc_client 7.0.20
universityofcalifornia boinc_client 7.0.21
universityofcalifornia boinc_client 7.0.22
universityofcalifornia boinc_client 7.0.23
universityofcalifornia boinc_client 7.0.24
universityofcalifornia boinc_client 7.0.25
universityofcalifornia boinc_client 7.0.26
universityofcalifornia boinc_client 7.0.27
universityofcalifornia boinc_client 7.0.28
universityofcalifornia boinc_client 7.0.29
universityofcalifornia boinc_client 7.0.30
universityofcalifornia boinc_client 7.0.31
universityofcalifornia boinc_client 7.0.32
universityofcalifornia boinc_client 7.0.33
universityofcalifornia boinc_client 7.0.34
universityofcalifornia boinc_client 7.0.35
universityofcalifornia boinc_client 7.0.36
universityofcalifornia boinc_client 7.0.45
universityofcalifornia boinc_client 7.0.46
universityofcalifornia boinc_client 7.0.47
universityofcalifornia boinc_client 7.0.48
universityofcalifornia boinc_client 7.0.49
universityofcalifornia boinc_client 7.0.50
universityofcalifornia boinc_client 7.0.51
universityofcalifornia boinc_client 7.0.52
universityofcalifornia boinc_client 7.0.53
universityofcalifornia boinc_client 7.0.54
universityofcalifornia boinc_client 7.0.55
universityofcalifornia boinc_client 7.0.56
universityofcalifornia boinc_client 7.0.57
universityofcalifornia boinc_client 7.0.58
universityofcalifornia boinc_client 7.0.59
universityofcalifornia boinc_client 7.0.60
universityofcalifornia boinc_client 7.0.61
universityofcalifornia boinc_client 7.0.62
universityofcalifornia boinc_client 7.0.63
universityofcalifornia boinc_client 7.0.64
universityofcalifornia boinc_client 7.0.65
universityofcalifornia boinc_client 7.0.66
universityofcalifornia boinc_client 7.0.67
universityofcalifornia boinc_client 7.0.68
universityofcalifornia boinc_client 7.0.69
universityofcalifornia boinc_client 7.0.70
universityofcalifornia boinc_client 7.0.71
universityofcalifornia boinc_client 7.0.72
universityofcalifornia boinc_client 7.0.73
universityofcalifornia boinc_client 7.0.74
universityofcalifornia boinc_client 7.0.75
universityofcalifornia boinc_client 7.0.76
universityofcalifornia boinc_client 7.0.77
universityofcalifornia boinc_client 7.0.78
universityofcalifornia boinc_client 7.0.79
universityofcalifornia boinc_client 7.0.80
universityofcalifornia boinc_client 7.1.0
universityofcalifornia boinc_client 7.1.1
universityofcalifornia boinc_client 7.1.2
universityofcalifornia boinc_client 7.1.3
universityofcalifornia boinc_client 7.1.4
universityofcalifornia boinc_client 7.1.5
universityofcalifornia boinc_client 7.1.6
universityofcalifornia boinc_client 7.1.7
universityofcalifornia boinc_client 7.1.8
universityofcalifornia boinc_client 7.1.9
universityofcalifornia boinc_client 7.1.10
universityofcalifornia boinc_client 7.1.11
universityofcalifornia boinc_client 7.1.12
universityofcalifornia boinc_client 7.1.13
universityofcalifornia boinc_client 7.1.14
universityofcalifornia boinc_client 7.1.15
universityofcalifornia boinc_client 7.1.16
universityofcalifornia boinc_client 7.1.17
universityofcalifornia boinc_client 7.1.18
universityofcalifornia boinc_client 7.1.19
universityofcalifornia boinc_client 7.1.20
universityofcalifornia boinc_client 7.1.21
universityofcalifornia boinc_client 7.2.0
universityofcalifornia boinc_client 7.2.1
universityofcalifornia boinc_client 7.2.2
universityofcalifornia boinc_client 7.2.3
universityofcalifornia boinc_client 7.2.4
universityofcalifornia boinc_client 7.2.5
universityofcalifornia boinc_client 7.2.6
universityofcalifornia boinc_client 7.2.7
universityofcalifornia boinc_client 7.2.8
universityofcalifornia boinc_client 7.2.9
universityofcalifornia boinc_client 7.2.10
universityofcalifornia boinc_client 7.2.11
universityofcalifornia boinc_client 7.2.12
universityofcalifornia boinc_client 7.2.13
universityofcalifornia boinc_client 7.2.14
universityofcalifornia boinc_client 7.2.15
universityofcalifornia boinc_client 7.2.16
universityofcalifornia boinc_client 7.2.17
universityofcalifornia boinc_client 7.2.18
universityofcalifornia boinc_client 7.2.19
universityofcalifornia boinc_client 7.2.20
universityofcalifornia boinc_client 7.2.21
universityofcalifornia boinc_client 7.2.22
universityofcalifornia boinc_client 7.2.23
universityofcalifornia boinc_client 7.2.24
universityofcalifornia boinc_client 7.2.25
universityofcalifornia boinc_client 7.2.26
universityofcalifornia boinc_client 7.2.27
universityofcalifornia boinc_client 7.2.28
universityofcalifornia boinc_client 7.2.29
universityofcalifornia boinc_client 7.2.31
universityofcalifornia boinc_client 7.2.32
universityofcalifornia boinc_client 7.2.33
universityofcalifornia boinc_client 7.2.34
universityofcalifornia boinc_client 7.2.35
universityofcalifornia boinc_client 7.2.36
universityofcalifornia boinc_client 7.2.37
universityofcalifornia boinc_client 7.2.38
universityofcalifornia boinc_client 7.2.39
universityofcalifornia boinc_client 7.2.40
universityofcalifornia boinc_client 7.2.41
universityofcalifornia boinc_client 7.2.42
universityofcalifornia boinc_client 7.2.43
universityofcalifornia boinc_client 7.2.44
universityofcalifornia boinc_client 7.2.47
universityofcalifornia boinc_client 7.3.0
universityofcalifornia boinc_client 7.3.1
universityofcalifornia boinc_client 7.3.2
universityofcalifornia boinc_client 7.3.3
universityofcalifornia boinc_client 7.3.4
universityofcalifornia boinc_client 7.3.5
universityofcalifornia boinc_client 7.3.6
universityofcalifornia boinc_client 7.3.7
universityofcalifornia boinc_client 7.3.8
universityofcalifornia boinc_client 7.3.9
universityofcalifornia boinc_client 7.3.10
universityofcalifornia boinc_client 7.3.11
universityofcalifornia boinc_client 7.3.12
universityofcalifornia boinc_client 7.3.13
universityofcalifornia boinc_client 7.3.14
universityofcalifornia boinc_client 7.3.15
universityofcalifornia boinc_client 7.3.16
universityofcalifornia boinc_client 7.3.17
universityofcalifornia boinc_client 7.3.18
universityofcalifornia boinc_client 7.3.19

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "72D08712-08B8-4CF8-816E-0245492E6A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E2B388-8839-49BA-97D5-1178C190E61D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EA0FC1-DF55-4B4E-9FDB-D5B478CFB788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C1A539-41E7-48A1-8C13-50D9F8B59503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "97638D84-2429-4BDE-B01C-5F54A9C8BB57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E647A8-728B-4671-BC61-CC277C86BA4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "169FD74C-CCB4-47BF-AD8F-EEF1D108BE8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "91AAD86A-7321-4409-A09D-32F68AFCFA9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE22BDA-185D-4BDB-A251-F2C264E443B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB51A05-4432-41FF-A644-FBF2E15C02A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "39130CDF-67C4-4F83-8131-FA61A09D15C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "98714E3B-3623-45F3-B110-93E338B06635",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CD8873-B877-49A4-B8EB-ED600F63FE54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD3E307E-456F-43ED-AFFD-EB76630EF3D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE83D7BC-EAAB-4AD0-B106-05C46A14A97A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF3FD542-1C90-4483-AD0A-07CD828F6D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "094DC9ED-6399-48A8-8162-4DF8B592CD5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C2CD23-2471-436F-8F2F-C057577D8606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D07FE6F-DC48-4CDC-A762-19A0F18CA927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "5617F6BE-1096-44D4-850D-23A50410CAFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62D6475-A03A-4592-9728-4C86F80F55C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "42FEC49C-7D3A-4768-B2A9-5D684BDF02C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB85E0E-A47B-4F56-A5C9-50322B804077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "963F5586-0EEA-4D08-9D0B-1477C7A18ADF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC1C1843-6DF2-44C7-96D1-2222CAAC3D90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E0160A9-BD01-48B3-B364-95D3CADDD325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A07F468-DB9D-4EF5-AA92-03198D86458C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "1468E038-BBB7-438F-90A8-7AE0B2213580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "9005FAA7-44E5-48B5-A821-76DF51AA072A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "52CE30BA-D2B5-45B9-B172-8FCC33B01875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "13622311-0274-4320-AC0D-1DFC56ACD6C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E001BA5-C287-4DAF-AD75-B13614F40138",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "061F470B-4258-4EDA-A455-94406A5AA49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "4144ABFA-30D6-403F-B06C-EB6FD3FA5D31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "789E9948-4BD1-49D4-8CB8-A7FC461A3499",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C83F53F-CC0C-4E8B-A370-B126136D69FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D4B4A0-EAC5-44CD-A3B1-846CF8D24253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "047B4BE2-7645-4462-94C8-75CF3D254F67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED4DBC1-C5A9-48CB-9A16-DAF82AF1C408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7B92EA1-E5B4-4033-B9F7-4D5DB2185D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C57DFB4-D4A4-4984-8F09-B3C42F4F6AD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "09D4354C-67BA-4528-BB36-A6DCA387C215",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2ECDD36-F19B-4F4B-A989-73C28B25FBD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28D4C39-F6EB-4FB0-B778-463DB06C6B16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7731646-7388-4CCE-8922-FC23970B7612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "463EEF45-F3D9-4C84-8732-F2AB09A3F4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DAC243F-9275-48A6-B3F7-C680BCC9BFC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E20BE840-BCA7-41FA-BF6D-6B5ED81709C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "4701F032-AE35-4316-AAFF-D95FE8B54FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0297F2F-9634-4281-969A-347F700F2C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D61390-9B3A-48A0-9370-5DDBB3506FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9EC494F-3064-4B5B-AD0B-CC5D60EC3EA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5036D79-54AE-41F5-A6C4-9E1375CE838A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2017E6D-8600-4699-89B3-97252B21581A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "A05D1BE7-2F16-44AE-B6D4-388764B9D3AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7057951-2340-4A56-8A15-8A9BC65F630A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "20A663AA-80B6-40A1-ABA1-5A969F036425",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EC0811F-3232-421C-ACF9-835D9B3B4EFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C1801E1-7DDD-40BD-B9F5-E98AC3B1E2D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4896AF-86D9-4475-B80D-B2F6080873CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "57033EA4-7921-4DC5-A6CF-736A81123F85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "2373784B-C25C-4EB4-A19B-EDC870EE40EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "2801EBD2-26E5-40D8-99F6-D38AC629A925",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "858694D8-1B83-4072-803D-1A6E0C3C7D76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13E07B1-2FB7-4CE8-81F4-B66EEC9624C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDA95B4-6876-4580-8D30-BC1F61259F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C85ABB-4EA4-4E88-A836-33B738DAAB5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2FA70D-C9D8-46F9-ABE8-9227DFEEE082",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "701DD561-65EB-406E-A741-2EE9690EA706",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "404C970E-CD43-4E9B-B4D1-F8FB00ED3CFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA61FA5-AA09-459E-9366-2A27A97FE01B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C70BA88-12A0-4278-A4B5-9A97F11CAC1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA43F1C8-4F6C-4B98-B17B-B719877D152A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD7A49C-F4A0-4184-9989-A881F04C5CF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE56322-9565-4816-9667-10BD07CC67AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "70EBAE6D-3431-4E12-9B5D-C7CE4F1BA20E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2961E7-7240-4E82-9EAB-7179844BED1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D50DC2-1B61-4B97-AC74-93A568BFC40B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "778D492F-1930-43EB-8D00-8B6709B66F24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "415EB17A-2F00-42A3-AD38-2D7FF7B61B1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA58FE4-4459-4C54-B752-7443804933F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "63CF77D9-78C4-4B4A-B4EA-1D058E8EE3C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C591FDF8-285B-4619-805A-1EBC14E6A12C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "89762343-F054-4405-9B10-9D7D4D5B2E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F5A6216-637A-4079-8ADD-A280CDEE93B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "270C3996-8DE7-4C5B-B9F6-ACADAA8E29B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "43BC1ACB-D2C2-432D-94D0-508F167E9D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D8EAFF-8A32-452D-B6E4-B616632939A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0D71F1-14FD-48E4-8080-86B5BD06E30B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3444FEE8-52CD-40B7-AB35-5281DDFB85DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6BE5B33-9C19-4255-B5EF-419999BE7633",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC7F0EFA-ECA4-41C2-8CA7-8CE4676DCC8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "887664ED-6C06-4062-8E6D-2549F358350E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "080DABAF-9700-43CA-8D5E-AE8FFF11BBF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7EB90FB-D2D7-45B1-9A0D-FF9FA054889C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B815A1C2-9D23-485D-8687-4725E56E70D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "830A4FE0-B923-4B00-8B03-93AB0C703F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA1FF50-0858-451E-A301-22AD6E048328",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E523E1-A0AF-493A-B0A2-1107F1EEEB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2CB1BDF-5AEE-4E8F-95DD-8DAC18731691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9320EBA-E9DC-4954-ADAC-6F91A2E47525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "17FE08E4-5304-4853-8685-63DBFCCA0BCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "66B5A49B-BBE2-402A-B7F4-7081116F4A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB443A80-98A3-4BF9-AB40-075F263150B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A33F67E-9BE2-43C2-976D-BF0600AADB27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C66739A-7265-4B19-AF9D-CAF6BE87616A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "C297FBED-C532-42BE-871B-C37CA35A2DB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B53C8AD-C4A8-4ED2-A493-88A7844387AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB97852C-EADD-4625-9B42-47102496306A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5193A320-35F4-47AD-A959-8F401CCCC35E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7587D83-5720-40A0-BF93-B83961D557A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F63A3B-E311-4254-9F12-79F958CF87A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F7CFA3B-2023-4D3E-A588-7139215B3C14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CFC8AC-E81F-48A8-A0D2-D69EC7FE68FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C5B346F-4424-43C1-94C0-002E753564AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "880AF08E-1B23-4ED7-B423-285931F3EA60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61BFF20-32F1-4AB0-8530-6FBE3A281EA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "623D9C4C-0363-42DF-86C4-B08363FDC66E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "50661394-6F1C-4BAE-9C9B-2A942D00A4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "8518678E-AB01-40D6-912C-C04353CB89A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EE8C03-C5C2-4DBF-8255-B4F0731163B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC9D27FB-D232-45E4-AB38-77AC5DC8A4AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2057F8-052F-4617-A22F-374D0FBD0B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D54458-49FD-41F1-8EAF-8A8E65844967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BB21B9F-0C5B-4282-A937-3B1E60E4E712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CC438E-C05B-4C91-99A0-EA800CEF5915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DC297C0-068D-4168-AA30-30475C89BC33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCAEEA3-F7A9-4C8D-93D0-C42525ED8BE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1A69D2C-1FAD-4957-9207-034179B9D193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A1E302-1B6D-4B56-A81F-467447E3CB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B2F3F21-55F8-4BE4-89BF-2B0F015B8C1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "6462918C-3D6F-4974-B113-3C9652C90B7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "A22F41F5-2CFD-404B-9D35-43DCC29C8C2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F61206A-340B-4CA1-A3CE-330DF31AF4B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "C984AFFC-5D04-4995-8D8A-DA75F64DEECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "96C7B30A-3929-490C-83F7-39AB8CA36B45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2D613F-75BB-4951-9857-F5CE21EF97B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF2B954-E0BD-4D97-BC91-91A5FECFA687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.2.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3D9A90-8AB6-45DD-9588-668C74D06AE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B1ED66C-FDEB-4474-AE38-B71DA8B1B0E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "94FA574F-F522-4EA0-AAA7-EADFA7DA958B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1452A45-D40D-46A7-A6F8-5871B0B108B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "738ECB72-6F01-408A-B3B8-2743673EF9C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8130E38D-0450-4531-99C0-00B7B5538287",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "645823B6-4412-4079-888D-F07872074E12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2FBD866-B8B3-4257-99B7-1F0834AE44B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5144BB6C-C9F3-4E67-8823-ED53D80FCC9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "30A53F8F-CDC5-4938-B4F3-C7FD9A53E5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD41F1D-E95C-4CC3-ACB6-827CD1D698A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C0DF10E-527E-460C-88C6-67C1BC674F37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8066AC-1A95-4E43-B55D-0A8B0D3EB911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "84DB7AD3-E414-42ED-BED2-770C98032A7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A3D6EF-9D3B-4FAA-9A40-4C42F01A42C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC84068-0120-4E22-AC14-6F629B5FC197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "555AE9E7-67E2-4F17-BACE-FB3B4E5BAE2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A05D64FE-DEA1-4C58-A435-82B4622452F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "862E53E4-5EC4-400E-914C-0DC5E4B0FC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "99651D27-8491-497C-99AC-F36B9085EE80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:7.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "B45F107D-2ED6-4E15-A44C-59D26079FE1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de buffer basado en pila en el analizador XML en BOINC 7.x permiten a atacantes tener impacto no especificado a trav\u00e9s de un archivo XML manipulado, relacionado con el planificador."
    }
  ],
  "id": "CVE-2013-2298",
  "lastModified": "2025-07-08T17:33:43.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-06-02T15:55:10.060",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/53192"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/59539"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/59539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-2019

Vulnerability from fkie_nvd - Published: 2014-06-02 15:55 - Updated: 2025-07-08 17:33

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.10.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "51305A0A-F2A8-4A87-B8A3-BFC4CA2186A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.12.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "50880F6C-D23E-4E75-92DD-A686841C0CC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer basado en pila en BOINC 6.10.58 y 6.12.34 permite a atacantes remotos tener impacto no especificado a trav\u00e9s de m\u00faltiples elementos file_signature."
    }
  ],
  "id": "CVE-2013-2019",
  "lastModified": "2025-07-08T17:33:43.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-06-02T15:55:09.700",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/59565"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/59565"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-5280

Vulnerability from fkie_nvd - Published: 2014-06-02 15:55 - Updated: 2025-07-08 17:33

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.13.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "01464AAC-49E5-4224-9C0E-E7F7C46CD11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:universityofcalifornia:boinc_client:6.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DE986A5-B8D0-460D-8172-8EA0D58060D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de buffer basado en pila en BOINC 6.13.x permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un trickle-up largo hacia (1) client/cs_trickle.cpp o (2) db/db_base.cpp."
    }
  ],
  "id": "CVE-2011-5280",
  "lastModified": "2025-07-08T17:33:43.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-06-02T15:55:07.807",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2013-2018 (GCVE-0-2013-2018)

Vulnerability from cvelistv5 – Published: 2020-02-19 23:40 – Updated: 2024-08-06 15:20
VLAI?
Summary
Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • SQL Injection
Assigner
Impacted products
Vendor Product Version
BOINC BOINC Affected: possibly 7.x and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:37.356Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "BOINC",
          "vendor": "BOINC",
          "versions": [
            {
              "status": "affected",
              "version": "possibly 7.x and earlier"
            }
          ]
        }
      ],
      "datePublic": "2013-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "SQL Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-19T23:40:32",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-2018",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "BOINC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "possibly 7.x and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "BOINC"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "SQL Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.openwall.com/lists/oss-security/2013/04/28/3",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
            },
            {
              "name": "http://www.openwall.com/lists/oss-security/2013/04/29/11",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2018",
    "datePublished": "2020-02-19T23:40:32",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:37.356Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2019 (GCVE-0-2013-2019)

Vulnerability from cvelistv5 – Published: 2014-06-02 15:00 – Updated: 2024-08-06 15:20
VLAI?
Summary
Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:37.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "name": "59565",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/59565"
          },
          {
            "name": "boinc-cve20132019-bo(83930)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
          },
          {
            "name": "[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-04-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "name": "59565",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/59565"
        },
        {
          "name": "boinc-cve20132019-bo(83930)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
        },
        {
          "name": "[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2019",
    "datePublished": "2014-06-02T15:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:37.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5280 (GCVE-0-2011-5280)

Vulnerability from cvelistv5 – Published: 2014-06-02 15:00 – Updated: 2024-09-17 04:14
VLAI?
Summary
Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:30:47.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-02T15:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5280",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
            },
            {
              "name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7",
              "refsource": "CONFIRM",
              "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
            },
            {
              "name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=5b04b249db166ec38c1ee99a9eadcaa300c0f454",
              "refsource": "CONFIRM",
              "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5280",
    "datePublished": "2014-06-02T15:00:00Z",
    "dateReserved": "2014-06-02T00:00:00Z",
    "dateUpdated": "2024-09-17T04:14:28.124Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-7386 (GCVE-0-2013-7386)

Vulnerability from cvelistv5 – Published: 2014-06-02 15:00 – Updated: 2024-09-16 17:47
VLAI?
Summary
Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:09:16.408Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
          },
          {
            "name": "FEDORA-2013-23734",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
          },
          {
            "name": "FEDORA-2013-23720",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-02T15:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
        },
        {
          "name": "FEDORA-2013-23734",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
        },
        {
          "name": "FEDORA-2013-23720",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7386",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=957795",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
            },
            {
              "name": "FEDORA-2013-23734",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
            },
            {
              "name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9",
              "refsource": "CONFIRM",
              "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
            },
            {
              "name": "FEDORA-2013-23720",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7386",
    "datePublished": "2014-06-02T15:00:00Z",
    "dateReserved": "2014-06-02T00:00:00Z",
    "dateUpdated": "2024-09-16T17:47:59.746Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2298 (GCVE-0-2013-2298)

Vulnerability from cvelistv5 – Published: 2014-06-02 15:00 – Updated: 2024-08-06 15:36
VLAI?
Summary
Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:36:46.433Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "name": "FEDORA-2013-23734",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
          },
          {
            "name": "53192",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53192"
          },
          {
            "name": "boinc-cve20132298-bo(83931)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
          },
          {
            "name": "[boinc_projects] 20130227 security patches for scheduler",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
          },
          {
            "name": "FEDORA-2013-23720",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
          },
          {
            "name": "59539",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/59539"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-02-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "name": "FEDORA-2013-23734",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
        },
        {
          "name": "53192",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53192"
        },
        {
          "name": "boinc-cve20132298-bo(83931)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
        },
        {
          "name": "[boinc_projects] 20130227 security patches for scheduler",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
        },
        {
          "name": "FEDORA-2013-23720",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
        },
        {
          "name": "59539",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/59539"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-2298",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
            },
            {
              "name": "FEDORA-2013-23734",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
            },
            {
              "name": "53192",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53192"
            },
            {
              "name": "boinc-cve20132298-bo(83931)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
            },
            {
              "name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b",
              "refsource": "CONFIRM",
              "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b"
            },
            {
              "name": "[boinc_projects] 20130227 security patches for scheduler",
              "refsource": "MLIST",
              "url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
            },
            {
              "name": "FEDORA-2013-23720",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
            },
            {
              "name": "59539",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/59539"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-2298",
    "datePublished": "2014-06-02T15:00:00",
    "dateReserved": "2013-03-04T00:00:00",
    "dateUpdated": "2024-08-06T15:36:46.433Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2018 (GCVE-0-2013-2018)

Vulnerability from nvd – Published: 2020-02-19 23:40 – Updated: 2024-08-06 15:20
VLAI?
Summary
Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • SQL Injection
Assigner
Impacted products
Vendor Product Version
BOINC BOINC Affected: possibly 7.x and earlier
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:37.356Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "BOINC",
          "vendor": "BOINC",
          "versions": [
            {
              "status": "affected",
              "version": "possibly 7.x and earlier"
            }
          ]
        }
      ],
      "datePublic": "2013-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "SQL Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-19T23:40:32",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-2018",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "BOINC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "possibly 7.x and earlier"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "BOINC"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in BOINC allow remote attackers to execute arbitrary SQL commands via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "SQL Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.openwall.com/lists/oss-security/2013/04/28/3",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
            },
            {
              "name": "http://www.openwall.com/lists/oss-security/2013/04/29/11",
              "refsource": "MISC",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2018",
    "datePublished": "2020-02-19T23:40:32",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:37.356Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2019 (GCVE-0-2013-2019)

Vulnerability from nvd – Published: 2014-06-02 15:00 – Updated: 2024-08-06 15:20
VLAI?
Summary
Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:20:37.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "name": "59565",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/59565"
          },
          {
            "name": "boinc-cve20132019-bo(83930)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
          },
          {
            "name": "[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-04-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "name": "59565",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/59565"
        },
        {
          "name": "boinc-cve20132019-bo(83930)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83930"
        },
        {
          "name": "[oss-security] 20130428 Re: Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/29/11"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2019",
    "datePublished": "2014-06-02T15:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:20:37.426Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5280 (GCVE-0-2011-5280)

Vulnerability from nvd – Published: 2014-06-02 15:00 – Updated: 2024-09-17 04:14
VLAI?
Summary
Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:30:47.033Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-02T15:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5280",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in BOINC 6.13.x allow remote attackers to cause a denial of service (crash) via a long trickle-up to (1) client/cs_trickle.cpp or (2) db/db_base.cpp."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
            },
            {
              "name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7",
              "refsource": "CONFIRM",
              "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=ae04b50a71f3e96ee1bc59b76fca97cf0fe976f7"
            },
            {
              "name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=5b04b249db166ec38c1ee99a9eadcaa300c0f454",
              "refsource": "CONFIRM",
              "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=5b04b249db166ec38c1ee99a9eadcaa300c0f454"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5280",
    "datePublished": "2014-06-02T15:00:00Z",
    "dateReserved": "2014-06-02T00:00:00Z",
    "dateUpdated": "2024-09-17T04:14:28.124Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-7386 (GCVE-0-2013-7386)

Vulnerability from nvd – Published: 2014-06-02 15:00 – Updated: 2024-09-16 17:47
VLAI?
Summary
Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:09:16.408Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
          },
          {
            "name": "FEDORA-2013-23734",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
          },
          {
            "name": "FEDORA-2013-23720",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-02T15:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
        },
        {
          "name": "FEDORA-2013-23734",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
        },
        {
          "name": "FEDORA-2013-23720",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7386",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in the PROJECT::write_account_file function in client/cs_account.cpp in BOINC, possibly 7.2.33, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via format string specifiers in the gui_urls item in an account file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=957795",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=957795"
            },
            {
              "name": "FEDORA-2013-23734",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
            },
            {
              "name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9",
              "refsource": "CONFIRM",
              "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=99258dcecba8ef36e1ce0fd6e0dacffe53613ac9"
            },
            {
              "name": "FEDORA-2013-23720",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7386",
    "datePublished": "2014-06-02T15:00:00Z",
    "dateReserved": "2014-06-02T00:00:00Z",
    "dateUpdated": "2024-09-16T17:47:59.746Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-2298 (GCVE-0-2013-2298)

Vulnerability from nvd – Published: 2014-06-02 15:00 – Updated: 2024-08-06 15:36
VLAI?
Summary
Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:36:46.433Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
          },
          {
            "name": "FEDORA-2013-23734",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
          },
          {
            "name": "53192",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53192"
          },
          {
            "name": "boinc-cve20132298-bo(83931)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
          },
          {
            "name": "[boinc_projects] 20130227 security patches for scheduler",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
          },
          {
            "name": "FEDORA-2013-23720",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
          },
          {
            "name": "59539",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/59539"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-02-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
        },
        {
          "name": "FEDORA-2013-23734",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
        },
        {
          "name": "53192",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53192"
        },
        {
          "name": "boinc-cve20132298-bo(83931)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git%3Ba=commitdiff%3Bh=2fea03824925cbcb976f4191f4d8321e41a4d95b"
        },
        {
          "name": "[boinc_projects] 20130227 security patches for scheduler",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
        },
        {
          "name": "FEDORA-2013-23720",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
        },
        {
          "name": "59539",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/59539"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-2298",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in the XML parser in BOINC 7.x allow attackers to have unspecified impact via a crafted XML file, related to the scheduler."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20130428 Multiple vulnerabilities in BOINC",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/04/28/3"
            },
            {
              "name": "FEDORA-2013-23734",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html"
            },
            {
              "name": "53192",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53192"
            },
            {
              "name": "boinc-cve20132298-bo(83931)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83931"
            },
            {
              "name": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b",
              "refsource": "CONFIRM",
              "url": "http://boinc.berkeley.edu/gitweb/?p=boinc-v2.git;a=commitdiff;h=2fea03824925cbcb976f4191f4d8321e41a4d95b"
            },
            {
              "name": "[boinc_projects] 20130227 security patches for scheduler",
              "refsource": "MLIST",
              "url": "http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741"
            },
            {
              "name": "FEDORA-2013-23720",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html"
            },
            {
              "name": "59539",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/59539"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-2298",
    "datePublished": "2014-06-02T15:00:00",
    "dateReserved": "2013-03-04T00:00:00",
    "dateUpdated": "2024-08-06T15:36:46.433Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}