Unrated severityNVD Advisory· Published Dec 6, 2014· Updated May 6, 2026
CVE-2014-9117
CVE-2014-9117
Description
MantisBT before 1.2.18 uses the public_key parameter value as the key to the CAPTCHA answer, which allows remote attackers to bypass the CAPTCHA protection mechanism by leveraging knowledge of a CAPTCHA answer for a public_key parameter value, as demonstrated by E4652 for the public_key value 0.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.mantisbt.org/bugs/view.phpnvdVendor Advisory
- secunia.com/advisories/62101nvd
- www.debian.org/security/2015/dsa-3120nvd
- www.openwall.com/lists/oss-security/2014/11/26/19nvd
- www.openwall.com/lists/oss-security/2014/11/27/8nvd
- www.securityfocus.com/bid/71321nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/99004nvd
- github.com/mantisbt/mantisbt/commit/7bb78e45nvd
News mentions
0No linked articles in our index yet.