9 results (0.005 seconds)

CVSS: 5.0EPSS: 14%CPEs: 2EXPL: 1

Stack-based buffer overflow in the logging function in the Unreal engine, possibly 2003 and 2004, as used in the internal web server, allows remote attackers to cause a denial of service (application crash) via a request for a long .gif filename in the images/ directory, related to conversion from Unicode to ASCII. Desbordamiento de búfer basado en pila en la función logging en Unreal engine, posiblemente 2003 y 2004, utilizado en los servidores web internos permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de una respuesta para un nombre de archivo largo .gif en el directorio images/, relacionado con la conversión de Unicode a ASCII. • https://www.exploit-db.com/exploits/30513 http://aluigi.org/adv/unrwebdos-adv.txt http://aluigi.org/poc/unrwebdos.zip http://secunia.com/advisories/26506 http://securityreason.com/securityalert/3039 http://www.securityfocus.com/archive/1/477026/100/0/threaded http://www.securityfocus.com/bid/25374 https://exchange.xforce.ibmcloud.com/vulnerabilities/36102 •

CVSS: 5.0EPSS: 5%CPEs: 2EXPL: 0

The UCC dedicated server for the Unreal engine, possibly 2003 and 2004, on Windows allows remote attackers to cause a denial of service (continuous beep and server slowdown) via a string containing many 0x07 characters in (1) a request to the images/ directory, (2) the Content-Type field, (3) a HEAD request, and possibly other unspecified vectors. El servidor dedicado UCC para el Unreal engine, posiblemente 2003 y 2004, sobre Windows permite a atacantes remotos provocar denegación de servicio (continuos pitidos y disminución de servidor) a través de una cadena que contiene varios caracteres 0x07 en (1) una respuesta en el directorio images/, (2) el campo Content-Type, (3) una respuesta HEAD, y posiblemente otros vectores no especificados. • http://aluigi.org/adv/unrwebdos-adv.txt http://aluigi.org/poc/unrwebdos.zip http://secunia.com/advisories/26506 http://securityreason.com/securityalert/3039 http://www.securityfocus.com/archive/1/477026/100/0/threaded http://www.securityfocus.com/archive/1/478053/100/200/threaded http://www.securityfocus.com/archive/1/478064/100/200/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/36103 •

CVSS: 5.0EPSS: 9%CPEs: 3EXPL: 3

Format string vulnerability in games using the Epic Games Unreal Engine 436 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in class names. • https://www.exploit-db.com/exploits/23799 http://aluigi.altervista.org/adv/unrfs-adv.txt http://marc.info/?l=bugtraq&m=107893764406905&w=2 http://marc.info/?l=bugtraq&m=107902755204583&w=2 http://secunia.com/advisories/11108 http://www.securityfocus.com/bid/9840 https://exchange.xforce.ibmcloud.com/vulnerabilities/15430 •

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 3

Directory traversal vulnerability in manifest.ini in Unreal engine allows remote attackers to overwrite arbitrary files via .. (dot dot) sequences in a UMOD (Unreal MOD) file. • https://www.exploit-db.com/exploits/24041 http://aluigi.altervista.org/adv/umod-adv.txt http://marc.info/?l=bugtraq&m=108267310519459&w=2 http://www.securityfocus.com/bid/10196 https://exchange.xforce.ibmcloud.com/vulnerabilities/15942 •

CVSS: 10.0EPSS: 62%CPEs: 21EXPL: 4

The Unreal Engine, as used in DeusEx 1.112fm and earlier, Devastation 390 and earlier, Mobile Forces 20000 and earlier, Nerf Arena Blast 1.2 and earlier, Postal 2 1337 and earlier, Rune 107 and earlier, Tactical Ops 3.4.0 and earlier, Unreal 1 226f and earlier, Unreal II XMP 7710 and earlier, Unreal Tournament 451b and earlier, Unreal Tournament 2003 2225 and earlier, Unreal Tournament 2004 before 3236, Wheel of Time 333b and earlier, and X-com Enforcer, allows remote attackers to execute arbitrary code via a UDP packet containing a secure query with a long value, which overwrites memory. El Motor de Unreal, usado en in DeusEx 1.112fm y anteriores, , Devastation 390 y anteriores, Mobile Forces 20000 y anteriores, Nerf Arena Blast 1.2 y anteriores, Postal 2 1337 y anteriores, Rune 107 y anteriores, Tactical Ops 3.4.0 y anteriores, Unreal 1 226f y anteriores, Unreal II XMP 7710 y anteriores, Unreal Tournament 451b y anteriores, Unreal Tournament 2003 2225 y anteriores, Unreal Tournament 2004 anteriores a 3236, Wheel of Time 333b y anteriores, and X-com Enforcer permite a atacantes remotos ejecutar código de su elección mediante un paquete UDP conteniendo una consulta segura con un valor largo, lo que sobreescribe memoria. • https://www.exploit-db.com/exploits/16848 https://www.exploit-db.com/exploits/10032 https://www.exploit-db.com/exploits/16693 http://aluigi.altervista.org/adv/unsecure-adv.txt http://marc.info/?l=bugtraq&m=108787105023304&w=2 http://www.gentoo.org/security/en/glsa/glsa-200407-14.xml http://www.securityfocus.com/bid/10570 https://exchange.xforce.ibmcloud.com/vulnerabilities/16451 •