Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wesnoth battle for wesnoth vulnerabilities and exploits
(subscribe to this query)
605
VMScore
CVE-2018-1999023
The Battle for Wesnoth Project version 1.7.0 up to and including 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, netwo...
Wesnoth The Battle For Wesnoth
356
VMScore
CVE-2015-5069
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth prior to 1.12.3 and 1.13.x prior to 1.13.1 allow remote malicious users to obtain sensitive information via vectors related to inclusion of...
Wesnoth Battle For Wesnoth
Wesnoth Battle For Wesnoth 1.13.0
Fedoraproject Fedora 21
Fedoraproject Fedora 22
312
VMScore
CVE-2015-5070
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth prior to 1.12.4 and 1.13.x prior to 1.13.1, when a case-insensitive filesystem is used, allow remote malicious users to obtain sensitive in...
Wesnoth Battle For Wesnoth
Wesnoth Battle For Wesnoth 1.13.0
Fedoraproject Fedora 21
Fedoraproject Fedora 22
445
VMScore
CVE-2015-0844
The WML/Lua API in Battle for Wesnoth 1.7.x up to and including 1.11.x and 1.12.x prior to 1.12.2 allows remote malicious users to read arbitrary files via a crafted (1) campaign or (2) map file.
Wesnoth Battle For Wesnoth 1.7.0
Wesnoth Battle For Wesnoth 1.7.13-1.8
Wesnoth Battle For Wesnoth 1.7.14-1.8
Wesnoth Battle For Wesnoth 1.7.15-1.8
Wesnoth Battle For Wesnoth 1.8.0
Wesnoth Battle For Wesnoth 1.9.0
Wesnoth Battle For Wesnoth 1.9.13
Wesnoth Battle For Wesnoth 1.9.14
Wesnoth Battle For Wesnoth 1.10.0
Wesnoth Battle For Wesnoth 1.11.0
Wesnoth Battle For Wesnoth 1.11.14
Wesnoth Battle For Wesnoth 1.11.15
Wesnoth Battle For Wesnoth 1.11.16
Wesnoth Battle For Wesnoth 1.11.17
Wesnoth Battle For Wesnoth 1.7.5
Wesnoth Battle For Wesnoth 1.7.6
Wesnoth Battle For Wesnoth 1.7.7
Wesnoth Battle For Wesnoth 1.7.8
Wesnoth Battle For Wesnoth 1.9.5
Wesnoth Battle For Wesnoth 1.9.6
Wesnoth Battle For Wesnoth 1.9.7
Wesnoth Battle For Wesnoth 1.9.8
801
VMScore
CVE-2007-5742
Directory traversal vulnerability in the WML engine preprocessor for Wesnoth 1.2.x prior to 1.2.8, and 1.3.x prior to 1.3.12, allows remote malicious users to read arbitrary files via ".." sequences in unknown vectors.
Wesnoth Wesnoth 0.2.1
Wesnoth Wesnoth 0.4.1
Wesnoth Wesnoth 0.4.2
Wesnoth Wesnoth 0.5.1
Wesnoth Wesnoth 0.6
Wesnoth Wesnoth 0.7
Wesnoth Wesnoth 0.7.1
Wesnoth Wesnoth 0.7.6
Wesnoth Wesnoth 0.7.7
Wesnoth Wesnoth 0.8.3
Wesnoth Wesnoth 0.8.4
Wesnoth Wesnoth 0.9.1
Wesnoth Wesnoth 0.9.2
Wesnoth Wesnoth 1.1
Wesnoth Wesnoth 1.1.1
Wesnoth Wesnoth 1.1.10
Wesnoth Wesnoth 1.1.4
Wesnoth Wesnoth 1.1.5
Wesnoth Wesnoth 1.2.2
Wesnoth Wesnoth 1.2.3
Wesnoth Wesnoth 0.3.2
Wesnoth Wesnoth 0.3.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started