Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
librdf raptor vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2020-25713
A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common.
Librdf Raptor Rdf Syntax Library 2.0.15
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
7.1
CVSSv3
CVE-2017-18926
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).
Librdf Raptor Rdf Syntax Library 2.0.15
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
6.5
CVSSv3
CVE-2012-0037
Redland Raptor (aka libraptor) prior to 2.0.7, as used by OpenOffice 3.3 and 3.4 Beta, LibreOffice prior to 3.4.6 and 3.5.x prior to 3.5.1, and other products, allows user-assisted remote malicious users to read arbitrary files via a crafted XML external entity (XXE) declaration ...
Librdf Raptor
Libreoffice Libreoffice 3.5.0
Libreoffice Libreoffice
Apache Openoffice 3.3.0
Apache Openoffice 3.4.0
Fedoraproject Fedora 17
Fedoraproject Fedora 16
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 6.2
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux Desktop 5.0
Redhat Storage 2.0
Redhat Storage For Public Cloud 2.0
Redhat Enterprise Linux Eus 6.2
Redhat Gluster Storage Server For On-premise 2.0
Debian Debian Linux 6.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started