Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-0844

Опубликовано: 14 апр. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 5

Описание

The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.

РелизСтатусПримечание
devel

released

1:1.10.7-2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:1.10.7-1ubuntu0.14.04.1]]
lucid

DNE

precise

released

1:1.10.2-1ubuntu1
trusty

released

1:1.10.7-1ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [1:1.10.7-1ubuntu0.14.04.1]
upstream

released

1:1.10.7-2
utopic

released

1:1.10.7-1ubuntu0.14.10.1

Показывать по

РелизСтатусПримечание
devel

released

1:1.12.2-1
esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

1:1.12.2-1
utopic

DNE

Показывать по

5 Medium

CVSS2

Связанные уязвимости

nvd
почти 11 лет назад

The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.

debian
почти 11 лет назад

The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x ...

github
больше 3 лет назад

The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file.

5 Medium

CVSS2