{"id":"CVE-2016-1241","details":"Tryton 3.x before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allow remote authenticated users to discover user password hashes via unspecified vectors.","aliases":["GHSA-52j9-v3jc-9xgc","PYSEC-2016-12","PYSEC-2016-40"],"modified":"2026-03-15T22:05:05.005324Z","published":"2016-09-07T19:28:00.127Z","references":[{"type":"ADVISORY","url":"http://www.tryton.org/posts/security-release-for-issue5795-and-issue5808.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3656"},{"type":"REPORT","url":"https://bugs.tryton.org/issue5795"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-1241.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"3.8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"3.8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"3.8.3"}]},{"events":[{"introduced":"0"},{"last_affected":"3.8.4"}]},{"events":[{"introduced":"0"},{"last_affected":"3.8.5"}]},{"events":[{"introduced":"0"},{"last_affected":"3.8.6"}]},{"events":[{"introduced":"0"},{"last_affected":"3.8.7"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"3.2.16"}]},{"events":[{"introduced":"0"},{"last_affected":"3.2.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.1"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.2"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.3"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.4"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.5"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.6"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.7"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.8"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.9"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.10"}]},{"events":[{"introduced":"0"},{"last_affected":"3.6.11"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.2"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.3"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.4"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.5"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.6"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.7"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.8"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.9"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.10"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.11"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.12"}]},{"events":[{"introduced":"0"},{"last_affected":"3.4.13"}]},{"events":[{"introduced":"0"},{"last_affected":"3.8.4"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}