Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w7ch-3pxv-5g4m

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.

The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.

EPSS

Процентиль: 86%
0.02842
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 14 лет назад

The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.

nvd
больше 14 лет назад

The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremulous 1.1.0, and ioUrbanTerror 2007-12-20, does not check for dangerous file extensions before writing to the quake3 directory, which allows remote attackers to execute arbitrary code via a crafted third-party addon that creates a Trojan horse DLL file, a different vulnerability than CVE-2011-2764.

debian
больше 14 лет назад

The ioQuake3 engine, as used in World of Padman 1.2 and earlier, Tremu ...

EPSS

Процентиль: 86%
0.02842
Низкий

Дефекты

CWE-20