Filtered by vendor Id Software Subscriptions
Total 27 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2005-0983 4 Activision, Id Software, Lucasarts and 1 more 10 Call Of Duty, Call Of Duty United Offensive, Return To Castle Wolfenstein and 7 more 2016-10-18 N/A
Quake 3 engine, as used in multiple games, allows remote attackers to cause a denial of service (client disconnect) via a long message, which is not properly truncated and causes the engine to process the remaining data as if it were network data.
CVE-2005-0430 1 Id Software 1 Quake 3 Engine 2016-10-18 N/A
The Quake 3 engine, as used in multiple game packages, allows remote attackers to cause a denial of service (shutdown game server) and possibly crash the server via a long infostring, possibly triggering a buffer overflow.
CVE-1999-1505 1 Id Software 1 Quakeworld 2016-10-18 N/A
Buffer overflow in QuakeWorld 2.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary commands via a long initial connect packet.
CVE-1999-1502 1 Id Software 1 Quake 2016-10-18 N/A
Buffer overflows in Quake 1.9 client allows remote malicious servers to execute arbitrary commands via long (1) precache paths, (2) server name, (3) server address, or (4) argument to the map console command.
CVE-2001-1289 1 Id Software 1 Quake 3 Arena 2008-09-10 N/A
Quake 3 arena 1.29f and 1.29g allows remote attackers to cause a denial of service (crash) via a malformed connection packet that begins with several char-255 characters.
CVE-2000-0303 1 Id Software 1 Quake 3 Arena 2008-09-10 N/A
Quake3 Arena allows malicious server operators to read or modify files on a client via a dot dot (..) attack.
CVE-2002-0770 1 Id Software 1 Quake 2i Server 2008-09-05 N/A
Quake 2 (Q2) server 3.20 and 3.21 allows remote attackers to obtain sensitive server cvar variables, obtain directory listings, and execute Q2 server admin commands via a client that does not expand "$" macros, which causes the server to expand the macros and leak the information, as demonstrated using "say $rcon_password."