Логотип exploitDog
bind:CVE-2014-9117
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-9117

Количество 4

Количество 4

ubuntu логотип

CVE-2014-9117

около 11 лет назад

MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2014-9117

около 11 лет назад

MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2014-9117

около 11 лет назад

MantisBT before 1.2.18 uses the public_key parameter value as the key ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-wpg2-2xjr-p95h

больше 3 лет назад

MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-9117

MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.

CVSS2: 5
1%
Низкий
около 11 лет назад
nvd логотип
CVE-2014-9117

MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.

CVSS2: 5
1%
Низкий
около 11 лет назад
debian логотип
CVE-2014-9117

MantisBT before 1.2.18 uses the public_key parameter value as the key ...

CVSS2: 5
1%
Низкий
около 11 лет назад
github логотип
GHSA-wpg2-2xjr-p95h

MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу