logo

CVE-2016-1241 trytond

Package

Manager: pip
Name: trytond
Vulnerable Version: >=3.0.0 <3.2.17 || >=3.4.0 <3.4.14 || >=3.8.0 <3.8.8 || >=3.6.0 <3.6.12 || >=4.0.0 <4.0.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00241 pctl0.47289

Details

Tryton allows users to read the hashed password Tryton 3.x before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allow remote authenticated users to discover user password hashes via unspecified vectors.

Metadata

Created: 2022-05-17T03:49:11Z
Modified: 2024-11-22T18:20:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-52j9-v3jc-9xgc/GHSA-52j9-v3jc-9xgc.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-52j9-v3jc-9xgc
Finding: F038
Auto approve: 1