CVE-2003-1433
https://notcve.org/view.php?id=CVE-2003-1433
Epic Games Unreal Engine 226f through 436 does not validate the challenge key, which allows remote attackers to exhaust the player limit by joining the game multiple times. • http://archives.neohapsis.com/archives/bugtraq/2003-02/0063.html http://archives.neohapsis.com/archives/bugtraq/2003-02/0142.html http://www.pivx.com/luigi/adv/ueng-adv.txt http://www.securityfocus.com/bid/6771 https://exchange.xforce.ibmcloud.com/vulnerabilities/11304 • CWE-287: Improper Authentication •
CVE-2003-1431 – Epic Games Unreal Engine 436 - Client Unreal URL Denial of Service
https://notcve.org/view.php?id=CVE-2003-1431
Buffer overflow in Epic Games Unreal Engine 226f through 436 allows remote attackers to cause a denial of service (crash) via a long host string in the Unreal URL. • https://www.exploit-db.com/exploits/22223 http://archives.neohapsis.com/archives/bugtraq/2003-02/0063.html http://archives.neohapsis.com/archives/bugtraq/2003-02/0142.html http://www.pivx.com/luigi/adv/ueng-adv.txt http://www.securityfocus.com/bid/6774 https://exchange.xforce.ibmcloud.com/vulnerabilities/11301 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2003-1430 – Epic Games Unreal Engine 436 - URL Directory Traversal
https://notcve.org/view.php?id=CVE-2003-1430
Directory traversal vulnerability in Unreal Tournament Server 436 and earlier allows remote attackers to access known files via a ".." (dot dot) in an unreal:// URL. • https://www.exploit-db.com/exploits/22224 http://archives.neohapsis.com/archives/bugtraq/2003-02/0063.html http://archives.neohapsis.com/archives/bugtraq/2003-02/0142.html http://www.securityfocus.com/bid/6775 https://exchange.xforce.ibmcloud.com/vulnerabilities/11299 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2003-1432
https://notcve.org/view.php?id=CVE-2003-1432
Epic Games Unreal Engine 226f through 436 allows remote attackers to cause a denial of service (CPU consumption or crash) and possibly execute arbitrary code via (1) a packet with a negative size value, which is treated as a large positive number during memory allocation, or (2) a negative size value in a package file. • http://archives.neohapsis.com/archives/bugtraq/2003-02/0063.html http://archives.neohapsis.com/archives/bugtraq/2003-02/0142.html http://archives.neohapsis.com/archives/bugtraq/2003-05/0142.html http://www.securityfocus.com/bid/6770 http://www.securityfocus.com/bid/6772 https://exchange.xforce.ibmcloud.com/vulnerabilities/11302 https://exchange.xforce.ibmcloud.com/vulnerabilities/11305 https://exchange.xforce.ibmcloud.com/vulnerabilities/12012 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-189: Numeric Errors •