CVE-2016-1241
Published: 07 September 2016
Tryton 3.x before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allow remote authenticated users to discover user password hashes via unspecified vectors.
Priority
CVSS 3 base score: 5.3
Status
Package | Release | Status |
---|---|---|
tryton-server Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.0.4-1)
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(4.0.4-1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(4.0.4-1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.0.4-1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needed
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [code not present])
|
|
Patches: Upstream: https://hg.tryton.org/trytond/rev/c997e99eaa65 (4.0) Upstream: https://hg.tryton.org/trytond/rev/7db67ae5f917 (trunk, test) |