2 results (0.012 seconds)

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

31 May 2019 — In Godot through 3.1, remote code execution is possible due to the deserialization policy not being applied correctly. En Godot hasta la versión 3.1, la ejecución de código remota es posible ya que la política de deserialización no se aplica correctamente. • https://github.com/godotengine/godot/pull/27398 • CWE-502: Deserialization of Untrusted Data •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

20 Aug 2018 — Godot Engine version All versions prior to 2.1.5, all 3.0 versions prior to 3.0.6. contains a Signed/unsigned comparison, wrong buffer size chackes, integer overflow, missing padding initialization vulnerability in (De)Serialization functions (core/io/marshalls.cpp) that can result in DoS (packet of death), possible leak of uninitialized memory. This attack appear to be exploitable via A malformed packet is received over the network by a Godot application that uses built-in serialization (e.g. game server, ... • https://github.com/zann1x/ITS • CWE-131: Incorrect Calculation of Buffer Size CWE-190: Integer Overflow or Wraparound CWE-681: Incorrect Conversion between Numeric Types CWE-908: Use of Uninitialized Resource CWE-909: Missing Initialization of Resource •