Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Ioquake3 Subscribe
Filtered by product Ioquake3 Engine
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2011-2764 6 Ioquake3, Openarena, Smokin-guns and 3 more 6 Ioquake3 Engine, Openarena, Smokin\' Guns and 3 more 2018-10-09 10.0 HIGH N/A
The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin' Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.
CVE-2011-3012 4 Ioquake3, Tremulous, Urbanterror and 1 more 4 Ioquake3 Engine, Tremulous, Iourbanterror and 1 more 2018-10-09 10.0 HIGH N/A
The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.
CVE-2011-1412 4 Ioquake3, Linux, Openarena and 1 more 4 Ioquake3 Engine, Linux Kernel, Openarena and 1 more 2018-10-09 7.5 HIGH N/A
sys/sys_unix.c in the ioQuake3 engine on Unix and Linux, as used in World of Padman 1.5.x before 1.5.1.1 and OpenArena 0.8.x-15 and 0.8.x-16, allows remote game servers to execute arbitrary commands via shell metacharacters in a long fs_game variable.
CVE-2012-3345 1 Ioquake3 1 Ioquake3 Engine 2017-06-30 5.6 MEDIUM N/A
ioquake3 before r2253 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/ioq3.pid temporary file.
CVE-2010-5077 3 Ioquake3, Openarena, Tremulous 3 Ioquake3 Engine, Openarena, Tremulous 2014-10-28 7.8 HIGH N/A
server/sv_main.c in Quake3 Arena, as used in ioquake3 before r1762, OpenArena, Tremulous, and other products, allows remote attackers to cause a denial of service (network traffic amplification) via a spoofed (1) getstatus or (2) rcon request.