[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2007-5742Date: (C)2007-12-01   (M)2018-02-19


Directory traversal vulnerability in the WML engine preprocessor for Wesnoth 1.2.x before 1.2.8, and 1.3.x before 1.3.12, allows remote attackers to read arbitrary files via ".." sequences in unknown vectors.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 9.0
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 8.5
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
BID-26626
SECUNIA-27786
SECUNIA-27920
SECUNIA-27943
OSVDB-41713
ADV-2007-4026
DSA-1421
FEDORA-2007-3986
FEDORA-2007-3989
http://sourceforge.net/project/shownotes.php?release_id=557098
http://www.wesnoth.org/forum/viewtopic.php?p=264289#264289
http://www.wesnoth.org/forum/viewtopic.php?t=18844
wesnoth-wml-directory-traversal(38752)

CWE    1
CWE-22

© SecPod Technologies