Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:activision:call_of_duty:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "56174554-305C-44B2-84AC-1FBFB2630806", "vulnerable": true}, {"criteria": "cpe:2.3:a:activision:call_of_duty:1.5b:*:*:*:*:*:*:*", "matchCriteriaId": "E73821EF-6B2C-47DF-8937-FC4AD438793C", "vulnerable": true}, {"criteria": "cpe:2.3:a:activision:call_of_duty_united_offensive:1.41:*:*:*:*:*:*:*", "matchCriteriaId": "794E93AF-7815-4C7B-B1F5-B24C6C8BFA90", "vulnerable": true}, {"criteria": "cpe:2.3:a:activision:call_of_duty_united_offensive:1.51b:*:*:*:*:*:*:*", "matchCriteriaId": "A5125394-3D87-449F-8116-1F2F13D0F4CB", "vulnerable": true}, {"criteria": "cpe:2.3:a:activision:return_to_castle_wolfenstein:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "3AB8B91F-5F9F-4A10-BD6E-8A6320113163", "vulnerable": true}, {"criteria": "cpe:2.3:a:activision:return_to_castle_wolfenstein:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "310CA9A4-4C58-47F0-B8B7-8602B2E4B290", "vulnerable": true}, {"criteria": "cpe:2.3:a:id_software:quake_3_arena:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "AA52F4D3-901C-441C-BFA2-1AF1BD06B967", "vulnerable": true}, {"criteria": "cpe:2.3:a:id_software:quake_3_arena:1.16:*:*:*:*:*:*:*", "matchCriteriaId": "FADA6FA7-6916-4240-90B7-5FB045F61F9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:id_software:quake_3_arena:1.31:*:*:*:*:*:*:*", "matchCriteriaId": "12138C9F-1DE9-48D9-AA12-5A621558F825", "vulnerable": true}, {"criteria": "cpe:2.3:a:id_software:quake_3_arena_server:1.29f:*:*:*:*:*:*:*", "matchCriteriaId": "47BF98EF-3228-4FF5-B770-C1A8BEC3C0A1", "vulnerable": true}, {"criteria": "cpe:2.3:a:id_software:quake_3_arena_server:1.29g:*:*:*:*:*:*:*", "matchCriteriaId": "2AEA3ACD-EC79-4AEC-B056-03F72056DE27", "vulnerable": true}, {"criteria": "cpe:2.3:a:id_software:quake_3_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "68AE0171-46F1-4137-99BE-4B825A403D6E", "vulnerable": true}, {"criteria": "cpe:2.3:a:id_software:wolfenstein_enemy_territory:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC2CB0EE-8042-4157-BB4B-A4A07BA79FE8", "vulnerable": true}, {"criteria": "cpe:2.3:a:id_software:wolfenstein_enemy_territory:2.56:*:*:*:*:*:*:*", "matchCriteriaId": "1CDC1195-FE8C-4251-91BE-B1B84A785C7D", "vulnerable": true}, {"criteria": "cpe:2.3:a:lucasarts:star_wars_jedi_knight_ii_jedi_outcast:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "736B09BA-E0C4-4179-84B2-F4F8F2FC4B66", "vulnerable": true}, {"criteria": "cpe:2.3:a:lucasarts:star_wars_jedi_knight_jedi_academy:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "E760893E-36FA-486D-872C-7C8E4B4C0A34", "vulnerable": true}, {"criteria": "cpe:2.3:a:raven_software:soldier_of_fortune_2:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "3EDA57E8-B70F-40F6-83F4-A19A41A55952", "vulnerable": true}, {"criteria": "cpe:2.3:a:raven_software:soldier_of_fortune_2:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB13EB2B-42EC-45ED-948B-7B2617C1B82C", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Quake 3 engine, as used in multiple games, allows remote attackers to cause a denial of service (client disconnect) via a long message, which is not properly truncated and causes the engine to process the remaining data as if it were network data."}], "id": "CVE-2005-0983", "lastModified": "2024-11-20T23:56:19.823", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2005-05-02T04:00:00.000", "references": [{"source": "cve@mitre.org", "tags": ["Exploit"], "url": "http://aluigi.altervista.org/adv/q3msgboom-adv.txt"}, {"source": "cve@mitre.org", "url": "http://bani.anime.net/banimod/forums/viewtopic.php?p=27322"}, {"source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq&m=111246796918067&w=2"}, {"source": "cve@mitre.org", "url": "http://secunia.com/advisories/14811"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/12976"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "http://aluigi.altervista.org/adv/q3msgboom-adv.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bani.anime.net/banimod/forums/viewtopic.php?p=27322"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq&m=111246796918067&w=2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/14811"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12976"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}