Filtered by vendor Id Software
Subscriptions
Total
27 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2005-0983 | 4 Activision, Id Software, Lucasarts and 1 more | 10 Call Of Duty, Call Of Duty United Offensive, Return To Castle Wolfenstein and 7 more | 2016-10-18 | N/A |
Quake 3 engine, as used in multiple games, allows remote attackers to cause a denial of service (client disconnect) via a long message, which is not properly truncated and causes the engine to process the remaining data as if it were network data. | ||||
CVE-2005-0430 | 1 Id Software | 1 Quake 3 Engine | 2016-10-18 | N/A |
The Quake 3 engine, as used in multiple game packages, allows remote attackers to cause a denial of service (shutdown game server) and possibly crash the server via a long infostring, possibly triggering a buffer overflow. | ||||
CVE-1999-1505 | 1 Id Software | 1 Quakeworld | 2016-10-18 | N/A |
Buffer overflow in QuakeWorld 2.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary commands via a long initial connect packet. | ||||
CVE-1999-1502 | 1 Id Software | 1 Quake | 2016-10-18 | N/A |
Buffer overflows in Quake 1.9 client allows remote malicious servers to execute arbitrary commands via long (1) precache paths, (2) server name, (3) server address, or (4) argument to the map console command. | ||||
CVE-2001-1289 | 1 Id Software | 1 Quake 3 Arena | 2008-09-10 | N/A |
Quake 3 arena 1.29f and 1.29g allows remote attackers to cause a denial of service (crash) via a malformed connection packet that begins with several char-255 characters. | ||||
CVE-2000-0303 | 1 Id Software | 1 Quake 3 Arena | 2008-09-10 | N/A |
Quake3 Arena allows malicious server operators to read or modify files on a client via a dot dot (..) attack. | ||||
CVE-2002-0770 | 1 Id Software | 1 Quake 2i Server | 2008-09-05 | N/A |
Quake 2 (Q2) server 3.20 and 3.21 allows remote attackers to obtain sensitive server cvar variables, obtain directory listings, and execute Q2 server admin commands via a client that does not expand "$" macros, which causes the server to expand the macros and leak the information, as demonstrated using "say $rcon_password." |