Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
id vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-33370
An uncaught exception vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing malicious users to cause the main web server of IDSecure to fault and crash, causing a denial of service.
Assaabloy Control Id Idsecure
NA
CVE-2023-33371
Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing malicious users to sign arbitrary session tokens and bypass authentication.
Assaabloy Control Id Idsecure
7.5
CVSSv2
CVE-2006-2875
Stack-based buffer overflow in the CL_ParseDownload function of Quake 3 Engine 1.32c and previous versions, as used in multiple products, allows remote malicious users to execute arbitrary code via a svc_download command with compressed data that triggers the overflow during expa...
Id Software Quake 3 Engine
1 EDB exploit
7.5
CVSSv2
CVE-2006-2082
Directory traversal vulnerability in Quake 3 engine, as used in products including Quake3 Arena, Return to Castle Wolfenstein, Wolfenstein: Enemy Territory, and Star Trek Voyager: Elite Force, when the sv_allowdownload cvar is enabled, allows remote malicious users to read arbitr...
Id Software Quake 3 Engine
5.4
CVSSv2
CVE-2014-7048
The Bear ID Lock (aka com.wBearIDLock) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Bearidlock Bear Id Lock 0.1
2.1
CVSSv2
CVE-1999-1229
Quake 2 server 3.13 on Linux does not properly check file permissions for the config.cfg configuration file, which allows local users to read arbitrary files via a symlink from config.cfg to the target file.
Id Software Quake 2 Server
NA
CVE-2023-2043
A vulnerability, which was classified as problematic, was found in Control iD RHiD 23.3.19.0. This affects an unknown part of the file /v2/customerdb/operator.svc/a of the component Edit Handler. The manipulation of the argument email leads to sql injection. It is possible to ini...
Assaabloy Control Id Rhid 23.3.19.0
NA
CVE-2023-2044
A vulnerability has been found in Control iD iDSecure 4.7.29.1 and classified as problematic. This vulnerability affects unknown code of the component Dispositivos Page. The manipulation of the argument IP-DNS leads to cross site scripting. The attack can be initiated remotely. V...
Assaabloy Control Id Idsecure 4.7.29.1
4.6
CVSSv2
CVE-2020-24456
Incorrect default permissions in the Intel(R) Board ID Tool version v.1.01 may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Board Id Tool 1.01
5
CVSSv2
CVE-2005-0430
The Quake 3 engine, as used in multiple game packages, allows remote malicious users to cause a denial of service (shutdown game server) and possibly crash the server via a long infostring, possibly triggering a buffer overflow.
Id Software Quake 3 Engine
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »