Vulnerabilities (CVE)

Filtered by vendor Teeworlds Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-12066 5 Canonical, Debian, Fedoraproject and 2 more 6 Ubuntu Linux, Debian Linux, Fedora and 3 more 2022-04-29 7.8 HIGH 7.5 HIGH
CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.
CVE-2021-43518 1 Teeworlds 1 Teeworlds 2021-12-27 6.8 MEDIUM 7.8 HIGH
Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
CVE-2018-18541 2 Debian, Teeworlds 2 Debian Linux, Teeworlds 2019-07-23 5.0 MEDIUM 7.5 HIGH
In Teeworlds before 0.6.5, connection packets could be forged. There was no challenge-response involved in the connection build up. A remote attacker could send connection packets from a spoofed IP address and occupy all server slots, or even use them for a reflection attack using map download packets.