Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
luigi auriemma vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-0325
Xpand Rally 1.0.0.0 allows remote attackers or remote malicious game servers to cause a denial of service (application crash) via a packet with large values that are not properly handled in certain malloc or memcpy operations.
Techland Xpand Rally 1.0
1 EDB exploit
NA
CVE-2005-0330
Buffer overflow in Painkiller 1.35 and previous versions, and possibly other versions prior to 1.61, allows remote authenticated users to cause a denial of service and possibly execute arbitrary code via a long cd-key hash.
People Can Fly Painkiller 1.3.5
People Can Fly Painkiller 1.3.1
1 EDB exploit
NA
CVE-2004-1395
The Lithtech engine, as used in (1) Contract Jack 1.1 and previous versions, (2) No one lives forever 2 1.3 and previous versions, (3) Tron 2.0 1.042 and previous versions, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote malicious users t...
Monolith Productions Tron 2.0.1.0
Monolith Productions Tron 2.0.1.42
Monolith Productions Contract Jack 1.1
Monolith Productions No One Lives Forever 2 1.0.004
Monolith Productions No One Lives Forever 2 1.3
1 EDB exploit
NA
CVE-2004-1493
Master of Orion III 1.2.5 and previous versions allows remote malicious users to cause a denial of service (server crash) via multiple connections with long nicknames, possibly triggering a buffer overflow.
1 EDB exploit
NA
CVE-2004-1500
Format string vulnerability in the Lithtech engine, as used in multiple games, allows remote authenticated users to cause a denial of service (application crash) via format string specifiers in (1) a nickname or (2) a message.
Monolith Productions Contract Jack 1.1
Monolith Productions Global Operations 2.0
Monolith Productions Shogo 2.2
Monolith Productions Tron 2.0.1.42
Monolith Productions Global Operations 2.1
Monolith Productions Kiss Psycho Circus 1.13
Freeform Interactive Purge Jihad 2.2.1
Monolith Productions Legends Of Might And Magic 1.1
Monolith Productions No One Lives Forever 1.0.004
Monolith Productions Alien Versus Predator 2.1.0.9.6
Monolith Productions Blood 2.2.1
Monolith Productions No One Lives Forever 2.1.3
Monolith Productions Sanity 1.0
1 EDB exploit
NA
CVE-2004-1539
Halo: Combat Evolved 1.05 and previous versions allows remote game servers to cause a denial of service (client crash) via a long value in a game server reply, which triggers a NULL dereference.
Gearbox Software Halo Combat Evolved 1.2
Gearbox Software Halo Combat Evolved 1.31
Gearbox Software Halo Combat Evolved 1.4
Gearbox Software Halo Combat Evolved 1.5
1 EDB exploit
NA
CVE-2004-1542
Buffer overflow in Soldier of Fortune II 1.03 Gold and previous versions allows remote malicious users to cause a denial of service (server or client crash) via a long (1) query or (2) reply.
Raven Software Soldier Of Fortune 2.1.0.3
Raven Software Soldier Of Fortune 2.1.0.2
1 EDB exploit
NA
CVE-2007-4754
Format string vulnerability in the safe_bprintf function in acesrc/acebot_cmds.c in Alien Arena 2007 6.10 and previous versions allows remote malicious users to cause a denial of service (daemon crash) via format string specifiers in a nickname.
Cor Entertainment Alien Arena 2007
1 EDB exploit
NA
CVE-2007-4838
Multiple buffer overflows in CellFactor Revolution 1.03 and previous versions allow remote malicious users to execute arbitrary code via a long string in a (1) 0x21, (2) 0x22, or (3) 0x23 packet.
Immersion Games Cellfactor Revolution
1 EDB exploit
NA
CVE-2006-0304
Buffer overflow in Dual DHCP DNS Server 1.0 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via the DHCP options field.
Achal Dhir Dual Dhcp Dns Server 1.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »