Vulnerabilities > Wesnoth

DATE CVE VULNERABILITY TITLE RISK
2018-07-23 CVE-2018-1999023 Code Injection vulnerability in Wesnoth the Battle FOR Wesnoth
The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox.
network
wesnoth CWE-94
6.8
2017-09-26 CVE-2015-5070 Information Exposure vulnerability in multiple products
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML.
3.5
2017-09-26 CVE-2015-5069 Information Exposure vulnerability in multiple products
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML.
network
low complexity
wesnoth fedoraproject CWE-200
4.0
2015-04-14 CVE-2015-0844 Information Exposure vulnerability in multiple products
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
network
low complexity
wesnoth fedoraproject CWE-200
5.0
2009-03-12 CVE-2009-0878 Resource Management Errors vulnerability in Wesnoth
The read_game_map function in src/terrain_translation.cpp in Wesnoth before r32987 allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a map with a large (1) width or (2) height.
network
low complexity
wesnoth CWE-399
5.0
2009-03-12 CVE-2009-0366 Resource Management Errors vulnerability in Wesnoth
The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document.
network
wesnoth CWE-399
4.3
2009-03-05 CVE-2009-0367 Permissions, Privileges, and Access Controls vulnerability in Wesnoth
The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.
network
wesnoth CWE-264
critical
9.3
2007-12-01 CVE-2007-6201 Remote Denial of Service vulnerability in Battle for Wesnoth turn_cmd
Unspecified vulnerability in Wesnoth 1.2.x before 1.2.8, and 1.3.x before 1.3.12, allows attackers to cause a denial of service (hang) via a "faulty add-on" and possibly execute other commands via unknown vectors related to the turn_cmd option.
network
low complexity
wesnoth
7.5
2007-12-01 CVE-2007-5742 Path Traversal vulnerability in Wesnoth
Directory traversal vulnerability in the WML engine preprocessor for Wesnoth 1.2.x before 1.2.8, and 1.3.x before 1.3.12, allows remote attackers to read arbitrary files via ".." sequences in unknown vectors.
network
low complexity
wesnoth CWE-22
critical
9.0
2007-10-11 CVE-2007-3917 USE of Externally-Controlled Format String vulnerability in Wesnoth
The multiplayer engine in Wesnoth 1.2.x before 1.2.7 and 1.3.x before 1.3.9 allows remote servers to cause a denial of service (crash) via a long message with multibyte characters that can produce an invalid UTF-8 string after it is truncated, which triggers an uncaught exception, involving the truncate_message function in server/server.cpp.
network
low complexity
wesnoth CWE-134
7.8