CVE-2011-2764 (GCVE-0-2011-2764)
Vulnerability from cvelistv5 – Published: 2011-08-04 01:00 – Updated: 2024-08-06 23:15
VLAI?
Summary
The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin' Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:15:30.694Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
},
{
"name": "45540",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45540"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"name": "45539",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/45539"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
},
{
"name": "48915",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201706-23"
},
{
"name": "FEDORA-2011-9898",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-07-28T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
},
{
"name": "45540",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45540"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"name": "45539",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/45539"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
},
{
"name": "48915",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201706-23"
},
{
"name": "FEDORA-2011-9898",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-2764",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html"
},
{
"name": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098",
"refsource": "CONFIRM",
"url": "http://svn.icculus.org/quake3?view=rev\u0026revision=2098"
},
{
"name": "45540",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45540"
},
{
"name": "ioquake-gamecode-code-execution(68870)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68870"
},
{
"name": "45539",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45539"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=725951",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=725951"
},
{
"name": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff",
"refsource": "CONFIRM",
"url": "http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff"
},
{
"name": "48915",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/48915"
},
{
"name": "20110728 Two security issues fixed in ioQuake3 engine",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/519051/100/0/threaded"
},
{
"name": "8324",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8324"
},
{
"name": "GLSA-201706-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-23"
},
{
"name": "FEDORA-2011-9898",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-2764",
"datePublished": "2011-08-04T01:00:00.000Z",
"dateReserved": "2011-07-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:15:30.694Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ioquake3:ioquake3_engine:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.36\", \"matchCriteriaId\": \"0A70EB58-3D3F-4A80-AD7C-0592C3BD3D3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ioquake3:ioquake3_engine:1.36:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"631580B6-FB90-44D0-A960-DE418F684FF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:openarena:openarena:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C66CEED6-0C18-4A8C-8369-2C8E23434587\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:smokin-guns:smokin\\\\\u0027_guns:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00EBAD21-CC29-4EF3-BE6D-334734D175FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tremulous:tremulous:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63624600-4577-4D6E-A733-1668CFD7732C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:urbanterror:iourbanterror:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9CA0A90-BF68-4294-86E5-4CF170709C08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:worldofpadman:world_of_padman:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7D65EC1-0FB2-4628-B877-EE1B00A26B56\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n FS_CheckFilenameIsNotExecutable de qcommon/files.c en el motor de ioQuake3 1.36 y versiones anteriores, tal como se usa en \\\"World of Padman\\\", \\\"Smokin\u0027 Guns\\\", OpenArena, Tremulous y ioUrbanTerror, no detecta extensiones de archivo peligrosas, lo que permite a atacantes remotos ejecutar c\\u00f3digo arbitrario a trav\\u00e9s de un complemento de terceras partes modificado que crea un archivo DLL troyanizado.\"}]",
"id": "CVE-2011-2764",
"lastModified": "2024-11-21T01:28:55.480",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-08-04T02:45:32.343",
"references": "[{\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/45539\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/45540\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securityreason.com/securityalert/8324\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://svn.icculus.org/quake3?view=rev\u0026revision=2098\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/519051/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/48915\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=725951\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/68870\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.gentoo.org/glsa/201706-23\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/45539\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/45540\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/8324\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://svn.icculus.org/quake3?view=rev\u0026revision=2098\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/519051/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/48915\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=725951\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/68870\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201706-23\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-2764\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-08-04T02:45:32.343\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ioQuake3 engine 1.36 and earlier, as used in World of Padman, Smokin\u0027 Guns, OpenArena, Tremulous, and ioUrbanTerror, does not properly determine dangerous file extensions, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n FS_CheckFilenameIsNotExecutable de qcommon/files.c en el motor de ioQuake3 1.36 y versiones anteriores, tal como se usa en \\\"World of Padman\\\", \\\"Smokin\u0027 Guns\\\", OpenArena, Tremulous y ioUrbanTerror, no detecta extensiones de archivo peligrosas, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un complemento de terceras partes modificado que crea un archivo DLL troyanizado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ioquake3:ioquake3_engine:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.36\",\"matchCriteriaId\":\"0A70EB58-3D3F-4A80-AD7C-0592C3BD3D3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ioquake3:ioquake3_engine:1.36:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"631580B6-FB90-44D0-A960-DE418F684FF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openarena:openarena:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C66CEED6-0C18-4A8C-8369-2C8E23434587\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:smokin-guns:smokin\\\\\u0027_guns:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EBAD21-CC29-4EF3-BE6D-334734D175FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tremulous:tremulous:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63624600-4577-4D6E-A733-1668CFD7732C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:urbanterror:iourbanterror:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CA0A90-BF68-4294-86E5-4CF170709C08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:worldofpadman:world_of_padman:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7D65EC1-0FB2-4628-B877-EE1B00A26B56\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/45539\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/45540\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/8324\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://svn.icculus.org/quake3?view=rev\u0026revision=2098\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/519051/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/48915\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=725951\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/68870\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201706-23\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2011-07/0338.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063460.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45539\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45540\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/8324\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.icculus.org/quake3?view=rev\u0026revision=2098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://thilo.tjps.eu/download/patches/ioq3-svn-r2098.diff\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/archive/1/519051/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/48915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=725951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/68870\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201706-23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…