CVE-2016-10143
https://notcve.org/view.php?id=CVE-2016-10143
A vulnerability in Tiki Wiki CMS 15.2 could allow a remote attacker to read arbitrary files on a targeted system via a crafted pathname in a banner URL field. Una vulnerabilidad en Tiki Wiki CMS 15.2 podría permitir a un atacante remoto leer archivos arbitrarios en un sistema objetivo a través de un nombre de ruta manipulado en un campo URL banner. • http://www.securityfocus.com/bid/96787 https://dev.tiki.org/item6174 https://sourceforge.net/p/tikiwiki/code/60308 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2016-9889
https://notcve.org/view.php?id=CVE-2016-9889
Some forms with the parameter geo_zoomlevel_to_found_location in Tiki Wiki CMS 12.x before 12.10 LTS, 15.x before 15.3 LTS, and 16.x before 16.1 don't have the input sanitized, related to tiki-setup.php and article_image.php. The impact is XSS. Algunas formas con el parámetro geo_zoomlevel_to_found_location en Tiki Wiki CMS 12.x en versiones anteriores a 12.10 LTS, 15.x en versiones anteriores a 15.3 LTS y 16.x en versiones anteriores a 16.1 no tienen la entrada desinfectada, relacionada con tiki-setup.php y article_image.php. El impacto es XSS • http://www.securityfocus.com/bid/95083 http://www.securitytracker.com/id/1037531 https://tiki.org/article443-Security-update-Tiki-16-1-Tiki-15-3-and-Tiki-12-10-released • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •