Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2015-5070

Disclosure Date: September 26, 2017 (last updated November 26, 2024)
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069.
0
Attacker Value
Unknown

CVE-2015-5069

Disclosure Date: September 26, 2017 (last updated November 26, 2024)
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML.
0
Attacker Value
Unknown

CVE-2015-0844

Disclosure Date: April 14, 2015 (last updated October 05, 2023)
The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.
0
Attacker Value
Unknown

CVE-2009-0366

Disclosure Date: March 12, 2009 (last updated October 04, 2023)
The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document.
0
Attacker Value
Unknown

CVE-2009-0878

Disclosure Date: March 12, 2009 (last updated October 04, 2023)
The read_game_map function in src/terrain_translation.cpp in Wesnoth before r32987 allows remote attackers to cause a denial of service (memory consumption and daemon hang) via a map with a large (1) width or (2) height.
0
Attacker Value
Unknown

CVE-2007-5742

Disclosure Date: December 01, 2007 (last updated October 04, 2023)
Directory traversal vulnerability in the WML engine preprocessor for Wesnoth 1.2.x before 1.2.8, and 1.3.x before 1.3.12, allows remote attackers to read arbitrary files via ".." sequences in unknown vectors.
0