Vulnerabilities > Raydium > Raydium > svn.revision.298
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2006-05-16 | CVE-2006-2412 | Remote Buffer Overflow and Denial Of Service vulnerability in Raydium The raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to cause a denial of service (application crash) via a large ID, which causes an invalid memory access (buffer over-read). | 5.0 |
2006-05-16 | CVE-2006-2411 | Remote Buffer Overflow and Denial Of Service vulnerability in Raydium Buffer overflow in raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to execute arbitrary code by sending packets with long global variables to the client. | 7.5 |
2006-05-16 | CVE-2006-2410 | Remote Buffer Overflow and Denial Of Service vulnerability in Raydium raydium_network_netcall_exec function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to cause a denial of service (application crash) via a packet of type 0xFF, which causes a null dereference. | 5.0 |
2006-05-16 | CVE-2006-2409 | USE of Externally-Controlled Format String vulnerability in Raydium Format string vulnerability in the raydium_log function in console.c in Raydium before SVN revision 310 allows local users to execute arbitrary code via format string specifiers in the format parameter, which are not properly handled in a call to raydium_console_line_add. | 4.6 |
2006-05-16 | CVE-2006-2408 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Raydium Multiple buffer overflows in Raydium before SVN revision 310 allow remote attackers to execute arbitrary code via a large packet when logged via (1) the raydium_log function in log.c or (2) the raydium_console_line_add function in console.c, possibly from a long player name. | 7.5 |