MoinMoin 1.7.1 allows remote attackers to bypass the textcha protection mechanism by modifying the textcha-question and textcha-answer fields to have empty values.
References
Configurations
History
21 Nov 2024, 01:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/39284 - | |
References | () http://www.debian.org/security/2010/dsa-2024 - | |
References | () http://www.ubuntu.com/usn/USN-925-1 - | |
References | () http://www.vupen.com/english/advisories/2010/0831 - |
Information
Published : 2010-04-05 15:30
Updated : 2024-11-21 01:13
NVD link : CVE-2010-1238
Mitre link : CVE-2010-1238
CVE.ORG link : CVE-2010-1238
JSON object : View
Products Affected
moinmo
- moinmoin
CWE
CWE-264
Permissions, Privileges, and Access Controls