mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
82 lines
2.7 KiB
JSON
82 lines
2.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2010-2702",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Buffer overflow in the UGameEngine::UpdateConnectingMessage function in the Unreal engine 1, 2, and 2.5, as used in multiple games including Unreal Tournament 2004, Unreal tournament 2003, Postal 2, Raven Shield, and SWAT4, when downloads are enabled, allows remote attackers to execute arbitrary code via a long LEVEL field in a WELCOME response to a download request."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "66039",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/66039"
|
|
},
|
|
{
|
|
"name": "40466",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/40466"
|
|
},
|
|
{
|
|
"name": "http://aluigi.altervista.org/adv/unrealcbof-adv.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://aluigi.altervista.org/adv/unrealcbof-adv.txt"
|
|
},
|
|
{
|
|
"name": "http://aluigi.org/poc/unrealcbof.txt",
|
|
"refsource": "MISC",
|
|
"url": "http://aluigi.org/poc/unrealcbof.txt"
|
|
},
|
|
{
|
|
"name": "unrealengine-ugameengineupdate-bo(60142)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60142"
|
|
}
|
|
]
|
|
}
|
|
} |