Tryton 3.x before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allow remote authenticated users to discover user password hashes via unspecified vectors.
References
| Link | Resource |
|---|---|
| http://www.debian.org/security/2016/dsa-3656 | Third Party Advisory |
| http://www.tryton.org/posts/security-release-for-issue5795-and-issue5808.html | Vendor Advisory |
| https://bugs.tryton.org/issue5795 | Issue Tracking |
| http://www.debian.org/security/2016/dsa-3656 | Third Party Advisory |
| http://www.tryton.org/posts/security-release-for-issue5795-and-issue5808.html | Vendor Advisory |
| https://bugs.tryton.org/issue5795 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2016-09-07 19:28
Updated : 2025-04-12 10:46
NVD link : CVE-2016-1241
Mitre link : CVE-2016-1241
CVE.ORG link : CVE-2016-1241
JSON object : View
Products Affected
tryton
- tryton
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
