Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: python312Packages.trytond

Found 2 matching suggestions

View:
Compact
Detailed
created 2 months ago Activity log
  • Created suggestion
trytond 2.4: ModelView.button fails to validate authorization

trytond 2.4: ModelView.button fails to validate authorization

Affected products

trytond
  • ==≤ 2.4

Matching in nixpkgs

pkgs.trytond

Server of the Tryton application platform

Package maintainers

Permalink CVE-2020-37014
6.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
created 2 months, 3 weeks ago Activity log
  • Created suggestion
Tryton 5.4 - Persistent Cross-Site Scripting

Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.

Affected products

Tryton
  • =<5.4

Matching in nixpkgs

pkgs.tryton

Client of the Tryton application platform

pkgs.trytond

Server of the Tryton application platform

Package maintainers