4
CVSSv2

CVE-2016-1242

Published: 07/09/2016 Updated: 13/01/2017
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 4.4 | Impact Score: 3.6 | Exploitability Score: 0.7
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

file_open in Tryton prior to 3.2.17, 3.4.x prior to 3.4.14, 3.6.x prior to 3.6.12, 3.8.x prior to 3.8.8, and 4.x prior to 4.0.4 allows remote authenticated users with certain permissions to read arbitrary files via the name parameter or unspecified other vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tryton tryton 4.0.3

tryton tryton 4.0.2

tryton tryton 4.0.0

tryton tryton 4.0.1

tryton tryton

tryton tryton 3.8.7

tryton tryton 3.8.0

tryton tryton 3.8.3

tryton tryton 3.8.1

tryton tryton 3.8.6

tryton tryton 3.8.5

tryton tryton 3.8.4

tryton tryton 3.8.2

tryton tryton 3.4.2

tryton tryton 3.4.5

tryton tryton 3.4.13

tryton tryton 3.4.0

tryton tryton 3.4.11

tryton tryton 3.4.9

tryton tryton 3.4.12

tryton tryton 3.4.4

tryton tryton 3.4.1

tryton tryton 3.4.6

tryton tryton 3.4.3

tryton tryton 3.4.10

tryton tryton 3.4.8

tryton tryton 3.4.7

tryton tryton 3.6.7

tryton tryton 3.6.6

tryton tryton 3.6.10

tryton tryton 3.2.0

tryton tryton 3.6.9

tryton tryton 3.6.0

tryton tryton 3.6.4

tryton tryton 3.6.2

tryton tryton 3.6.1

tryton tryton 3.6.5

tryton tryton 3.6.8

tryton tryton 3.6.3

tryton tryton 3.6.11

Vendor Advisories

Two vulnerabilities have been discovered in the server for the Tryton application platform, which may result in information disclosure of password hashes or file contents For the stable distribution (jessie), these problems have been fixed in version 340-3+deb8u2 For the unstable distribution (sid), these problems have been fixed in version 40 ...