Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2004-1395

EPSS 14.12% · P94
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2004-1395

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Lithtech engine, as used in (1) Contract Jack 1.1 and earlier, (2) No one lives forever 2 1.3 and earlier, (3) Tron 2.0 1.042 and earlier, (4) F.E.A.R. (First Encounter Assault and Recon), and possibly other games, allows remote attackers to cause a denial of service (connection refused) via a UDP packet that causes recvfrom to generate a return code that causes the listening loop to exit, as demonstrated using zero byte packets or packets between 8193 and 12280 bytes, which result in conditions that are not "Operation would block."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Monolith Lithtech游戏引擎远程服务拒绝漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
用于(1)Contract Jack 1.1及其早期版本,(2)No one lives forever 2 1.3及其早期版本,(3)Tron 2.0 1.042及其早期版本,(4)F.E.A.R. (First Encounter Assault and Recon)和可能其它游戏中的Lithtech engine存在漏洞。远程攻击者可以借助UDP数据包导致服务拒绝(连接拒绝),并导致recvfrom产生返回代码而导致监听循环结束。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2004-1395

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2004-1395

登录查看更多情报信息。

Same Patch Batch · n/a · 2005-02-12 · 37 CVEs total

CVE-2004-1423php-Calendar远程任意命令执行漏洞
CVE-2004-14152BGal远程SQL注入漏洞
CVE-2004-1416Microsoft Internet Explorer 安全漏洞
CVE-2004-1417PsychoStats登录参数跨站脚本漏洞
CVE-2004-1418Wirtualna Polska WPKontakt远程脚本执行漏洞
CVE-2004-1419ZeroBoard多个远程脚本注入和跨站脚本漏洞
CVE-2004-1420WHM Autopilot多个安全漏洞
CVE-2004-1421WHM Autopilot多个安全漏洞
CVE-2004-1422WHM Autopilot多个安全漏洞
CVE-2004-1414Gadu-Gadu服务拒绝漏洞
CVE-2004-1424Moodle 跨站脚本漏洞
CVE-2004-1425Moodle 安全漏洞
CVE-2004-1426KorWeblog php远程注入漏洞
CVE-2004-1427KorWeblog php远程注入漏洞
CVE-2004-1428ArGoSoft FTP Server泄露合法用户名允许暴力猜解漏洞
CVE-2004-1429ArGoSoft FTP加密问题漏洞
CVE-2004-1430IBProArcade远程SQL注入漏洞
CVE-2004-1431Jacks FormMail.php远程文件包含漏洞
CVE-2004-1405MediaWiki远程任意脚本上传漏洞
CVE-2004-1397UseModWiki Wiki.PL跨站脚本攻击(XSS)漏洞

Showing top 20 of 37 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2004-1395

No comments yet


Leave a comment