Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f5cf-wmjx-wx2h

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION.

The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION.

EPSS

Процентиль: 70%
0.00645
Низкий

Связанные уязвимости

nvd
больше 18 лет назад

The (1) Textimage 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal and the (2) Captcha 4.7.x before 4.7-1.2 and 5.x before 5.x-1.1 module for Drupal allow remote attackers to bypass the CAPTCHA test via an empty captcha element in $_SESSION.

EPSS

Процентиль: 70%
0.00645
Низкий