Lucene search

K

CVE-2014-6633

🗓️ 12 Apr 2018 15:00:29Reported by Debian Security Bug TrackerType 
debiancve
 debiancve
🔗 security-tracker.debian.org👁 14 Views

The safe_eval function in Tryton allows remote authenticated users to execute arbitrary commands via shell metacharacters in the collection.domain or formula field

Show more
Related
Packages
ReporterTitlePublishedViews
Family
Tenable Nessus
Debian DLA-70-1 : tryton-server security update
26 Mar 201500:00
nessus
Tenable Nessus
Debian DSA-3043-1 : tryton-server - security update
9 Mar 202000:00
nessus
OpenVAS
Debian: Security Advisory (DSA-3043-1)
8 Mar 202300:00
openvas
OpenVAS
Debian: Security Advisory (DLA-70-1)
8 Mar 202300:00
openvas
CVE
CVE-2014-6633
12 Apr 201815:29
cve
Debian
[SECURITY] [DLA 70-1] tryton-server security update
5 Oct 201418:33
debian
NVD
CVE-2014-6633
12 Apr 201815:29
nvd
OSV
tryton-server - security update
5 Oct 201400:00
osv
OSV
tryton-server - security update
4 Oct 201400:00
osv
OSV
PYSEC-2018-59
12 Apr 201815:29
osv
Rows per page
OSOS VersionArchitecturePackagePackage VersionFilename
Debian12alltryton-server3.2.3-1tryton-server_3.2.3-1_all.deb
Debian11alltryton-server3.2.3-1tryton-server_3.2.3-1_all.deb
Debian999alltryton-server3.2.3-1tryton-server_3.2.3-1_all.deb
Debian13alltryton-server3.2.3-1tryton-server_3.2.3-1_all.deb

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
12 Apr 2018 15:29Current
7.2High risk
Vulners AI Score7.2
CVSS29
CVSS38.8
EPSS0.003
14
.json
Report