Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Teeworlds
(Teeworlds)Repositories | https://github.com/teeworlds/teeworlds |
#Vulnerabilities | 11 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-05-23 | CVE-2023-31517 | A memory leak in the component CConsole::Chain of Teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via opening a crafted file. | Teeworlds | 7.5 | ||
2017-02-22 | CVE-2016-9400 | The CClient::ProcessServerPacket method in engine/client/client.cpp in Teeworlds before 0.6.4 allows remote servers to write to arbitrary physical memory locations and possibly execute arbitrary code via vectors involving snap handling. | Fedora, Teeworlds | 9.8 | ||
2019-04-05 | CVE-2019-10878 | In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution. | Teeworlds | 9.8 | ||
2019-04-05 | CVE-2019-10879 | In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled. | Teeworlds | 9.8 | ||
2019-04-05 | CVE-2019-10877 | In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled. | Teeworlds | 9.8 | ||
2020-04-22 | CVE-2019-20787 | Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size. | Leap, Teeworlds | 9.8 | ||
2020-04-22 | CVE-2020-12066 | CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server. | Ubuntu_linux, Debian_linux, Fedora, Backports_sle, Leap, Teeworlds | 7.5 | ||
2021-12-15 | CVE-2021-43518 | Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution. | Fedora, Teeworlds | 7.8 | ||
2023-05-23 | CVE-2023-31518 | A heap use-after-free in the component CDataFileReader::GetItem of teeworlds v0.7.5 allows attackers to cause a Denial of Service (DoS) via a crafted map file. | Teeworlds | 5.5 |