CVE-2010-1238

Priority
Low
Description
MoinMoin 1.7.1 allows remote attackers to bypass the textcha protection
mechanism by modifying the textcha-question and textcha-answer fields to
have empty values.
References
Notes
 jdstrand> at least 1.8.2 and higher are not affected
Assigned-to
jdstrand
Package
Source: moin (LP Ubuntu Debian)
Upstream:released (1.8.2)
Patches:
Upstream:http://hg.moinmo.in/moin/1.7/rev/a952d07dea69
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-29 20:38:16 UTC (commit 9756)