Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-1999023

Опубликовано: 23 июл. 2018
Источник: nvd
CVSS3: 8.8
CVSS2: 6.8
EPSS Низкий

Описание

The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:wesnoth:the_battle_for_wesnoth:*:*:*:*:*:*:*:*
Версия от 1.7.0 (включая) до 1.14.3 (включая)

EPSS

Процентиль: 73%
0.00799
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 7 лет назад

The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.

CVSS3: 8.8
msrc
около 1 года назад

Описание отсутствует

CVSS3: 8.8
debian
около 7 лет назад

The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a ...

CVSS3: 8.8
github
больше 3 лет назад

The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.

EPSS

Процентиль: 73%
0.00799
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-94