{"id":"CVE-2010-1238","details":"MoinMoin 1.7.1 allows remote attackers to bypass the textcha protection mechanism by modifying the textcha-question and textcha-answer fields to have empty values.","modified":"2024-06-04T04:00:19Z","published":"2010-04-05T15:30:01Z","withdrawn":"2024-06-30T15:57:45.413036Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/39284"},{"type":"ADVISORY","url":"http://www.debian.org/security/2010/dsa-2024"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-925-1"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/0831"}],"affected":[{"package":{"name":"moin","ecosystem":"Debian:10","purl":"pkg:deb/debian/moin?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.9.2-3"}]}],"ecosystem_specific":{"urgency":"medium"},"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2010-1238.json"}}],"schema_version":"1.7.3"}