
CVE-2015-5069
https://notcve.org/view.php?id=CVE-2015-5069
26 Sep 2017 — The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. La función (1) filesystem::get_wml_location en filesystem.cpp y la función (2) is_legal_file en filesystem_boost.cpp en Battle for Wesnoth en versiones anteriores a la 1.12.3 y las versiones 1.13.x anteriores a 1.13.1 pe... • http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2015-5070
https://notcve.org/view.php?id=CVE-2015-5070
26 Sep 2017 — The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069. La función (1) filesystem::get_wml_location en filesystem.cpp y la función (2) is_legal_file en... • http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •