Page 4 of 19 results (0.007 seconds)

CVSS: 2.1EPSS: 0%CPEs: 19EXPL: 2

OpenTTD 0.4.7 and earlier allows local users to cause a denial of service (application exit) via a large invalid error number, which triggers an error. • https://www.exploit-db.com/exploits/1709 http://aluigi.altervista.org/adv/openttdx-adv.txt http://secunia.com/advisories/19768 http://secunia.com/advisories/21799 http://security.gentoo.org/glsa/glsa-200609-03.xml http://www.securityfocus.com/archive/1/431871/100/0/threaded http://www.securityfocus.com/bid/17661 http://www.vupen.com/english/advisories/2006/1480 https://exchange.xforce.ibmcloud.com/vulnerabilities/26000 •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

The multiplayer menu in OpenTTD 0.4.7 allows remote attackers to cause a denial of service via a UDP packet with an incorrect size, which causes the client to return to the main menu. • https://www.exploit-db.com/exploits/1709 http://aluigi.altervista.org/adv/openttdx-adv.txt http://secunia.com/advisories/19768 http://secunia.com/advisories/21799 http://security.gentoo.org/glsa/glsa-200609-03.xml http://www.securityfocus.com/archive/1/431871/100/0/threaded http://www.securityfocus.com/bid/17661 http://www.vupen.com/english/advisories/2006/1480 https://exchange.xforce.ibmcloud.com/vulnerabilities/26004 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in OpenTTD before 0.4.0.1 allow attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. • http://bugs.gentoo.org/show_bug.cgi?id=102631 http://www.gentoo.org/security/en/glsa/glsa-200509-03.xml http://www.vupen.com/english/advisories/2005/1640 •

CVSS: 7.5EPSS: 2%CPEs: 15EXPL: 0

Multiple format string vulnerabilities in OpenTTD before 0.4.0.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors. • http://bugs.gentoo.org/show_bug.cgi?id=102631 http://www.gentoo.org/security/en/glsa/glsa-200509-03.xml http://www.vupen.com/english/advisories/2005/1640 •