CVE-2014-9117
06.12.2014, 21:59
MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.Enginsight
Vendor | Product | Version |
---|---|---|
mantisbt | mantisbt | 𝑥 ≤ 1.2.17 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References