Vulnerability Database
Blog
FAQ
Docs
DSA-2791-1
See a problem?
Please try reporting it
to the source
first.
Source
https://security-tracker.debian.org/tracker/DSA-2791-1
Import Source
https://storage.googleapis.com/debian-osv/dsa-osv/DSA-2791-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/DSA-2791-1
Related
CVE-2013-4510
Published
2013-11-04T00:00:00Z
Modified
2024-01-09T20:27:05.556420Z
Summary
tryton-client - missing input sanitization
Details
References
Affected packages
Debian:6.0
/
tryton-client
Package
Name
tryton-client
Purl
pkg:deb/debian/tryton-client?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.6.1-1+deb6u1
Affected versions
1.*
1.6.1-1
Debian:7
/
tryton-client
Package
Name
tryton-client
Purl
pkg:deb/debian/tryton-client?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
2.2.3-1+deb7u1
Affected versions
2.*
2.2.3-1
DSA-2791-1 - OSV