MoinMoin 1.7.1 allows remote attackers to bypass the textcha protection mechanism by modifying the textcha-question and textcha-answer fields to have empty values.
{ "urgency": "medium" }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2010-1238.json"