Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
id vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-2875
Stack-based buffer overflow in the CL_ParseDownload function of Quake 3 Engine 1.32c and previous versions, as used in multiple products, allows remote malicious users to execute arbitrary code via a svc_download command with compressed data that triggers the overflow during expa...
Id Software Quake 3 Engine
1 EDB exploit
NA
CVE-2005-0983
Quake 3 engine, as used in multiple games, allows remote malicious users to cause a denial of service (client disconnect) via a long message, which is not properly truncated and causes the engine to process the remaining data as if it were network data.
Activision Call Of Duty 1.4
Activision Call Of Duty 1.5b
Id Software Quake 3 Arena 1.31
Id Software Quake 3 Arena Server 1.29f
Raven Software Soldier Of Fortune 2 1.0.3
Activision Return To Castle Wolfenstein 1.0
Activision Return To Castle Wolfenstein 1.1
Id Software Wolfenstein Enemy Territory 1.0.2
Id Software Wolfenstein Enemy Territory 2.56
Activision Call Of Duty United Offensive 1.41
Activision Call Of Duty United Offensive 1.51b
Id Software Quake 3 Arena Server 1.29g
Id Software Quake 3 Engine
Id Software Quake 3 Arena 1.1.7
Id Software Quake 3 Arena 1.16
Lucasarts Star Wars Jedi Knight Ii Jedi Outcast 1.0.4
Lucasarts Star Wars Jedi Knight Jedi Academy 1.0.11
Raven Software Soldier Of Fortune 2 1.0.2
5.3
CVSSv3
CVE-2023-4392
A vulnerability was found in Control iD Gerencia Web 1.30 and classified as problematic. Affected by this issue is some unknown functionality of the component Cookie Handler. The manipulation leads to cleartext storage of sensitive information. The attack may be launched remotely...
Assaabloy Control Id Gerencia Web 1.30
NA
CVE-2000-0303
Quake3 Arena allows malicious server operators to read or modify files on a client via a dot dot (..) attack.
Id Software Quake 3 Arena 1.16n
NA
CVE-2014-5725
The Truecaller - Caller ID & Block (aka com.truecaller) application 4.32 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle malicious users to spoof servers and obtain sensitive information via a crafted certificate.
Truecaller Truecaller-caller Id \\& Block 4.32
NA
CVE-2006-0107
SQL injection vulnerability in Timecan CMS allows remote malicious users to execute arbitrary SQL commands via the viewID parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Due to the unavailability of the...
Idea Development Id Oy Timecan Cms
NA
CVE-2006-0108
SQL injection vulnerability in mcl_login.asp in Timecan CMS allows remote malicious users to execute arbitrary SQL commands via the email parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Due to the unava...
Idea Development Id Oy Timecan Cms
NA
CVE-2000-1080
Quake 1 (quake1) and ProQuake 1.01 and previous versions allow remote malicious users to cause a denial of service via a malformed (empty) UDP packet.
Id Software Quake 1.9
J. P. Grossman Proquake 1.0
8.8
CVSSv3
CVE-2017-12216
A vulnerability in the web-based user interface of Cisco SocialMiner could allow an unauthenticated, remote malicious user to have read and write access to information stored in the affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entrie...
Cisco Socialminer -
5.4
CVSSv3
CVE-2017-12269
A vulnerability in the web UI of Cisco Spark Messaging Software could allow an authenticated, remote malicious user to perform a stored cross-site scripting (XSS) attack. The vulnerability is due to insufficient input validation by the web UI of the affected software. An attacker...
Cisco Spark -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »