Computer Security
[EN] securityvulns.ru no-pyccku


Battle of Wesnoth directory traversal
Published:12.05.2015
Source:
SecurityVulns ID:14480
Type:client
Threat Level:
5/10
Description:Directory traversal on maps loading.
Affected:WESNOTH : Battle for Wesnoth 1.12
CVE:CVE-2015-0844 (The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 3218-1] wesnoth-1.10 security update (12.05.2015)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod