Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-37014

Опубликовано: 30 янв. 2026
Источник: debian
EPSS Низкий

Описание

Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tryton-saofixed5.0.26-1package

Примечания

  • https://www.exploit-db.com/exploits/48466

  • https://www.vulnerability-lab.com/get_content.php?id=2233

  • ttps://discuss.tryton.org/t/security-release-for-issue9351/2772

  • https://foss.heptapod.net/tryton/tryton/-/issues/9351

EPSS

Процентиль: 13%
0.00044
Низкий

Связанные уязвимости

CVSS3: 6.4
ubuntu
6 дней назад

Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.

CVSS3: 6.4
nvd
8 дней назад

Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.

CVSS3: 6.4
github
8 дней назад

Tryton 5.4 contains a persistent cross-site scripting vulnerability in the user profile name input that allows remote attackers to inject malicious scripts. Attackers can exploit the vulnerability by inserting script payloads in the name field, which execute in the frontend and backend user interfaces.

EPSS

Процентиль: 13%
0.00044
Низкий