Lucene search

K

Battle For Wesnoth Security Vulnerabilities

cve
cve

CVE-2018-1999023

The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and...

8.8CVSS

8.6AI Score

0.002EPSS

2022-10-03 04:22 PM
29
cve
cve

CVE-2015-5069

The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from...

4.3CVSS

3.9AI Score

0.002EPSS

2017-09-26 02:29 PM
23
cve
cve

CVE-2015-5070

The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors...

3.1CVSS

4AI Score

0.002EPSS

2017-09-26 02:29 PM
26
cve
cve

CVE-2015-0844

The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map...

6.4AI Score

0.006EPSS

2015-04-14 06:59 PM
28