1
Candidate: CVE-2014-6633
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6633
5
https://bugs.tryton.org/issue4155
7
The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before
8
2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3
9
allows remote authenticated users to execute arbitrary commands via shell
10
metacharacters in (1) the collection.domain in the webdav module or (2) the
11
formula field in the price_list module.
19
Patches_tryton-server:
20
upstream_tryton-server: released (3.2.3-1)
21
lucid_tryton-server: ignored (reached end-of-life)
22
precise_tryton-server: ignored (reached end-of-life)
23
precise/esm_tryton-server: DNE (precise was needed)
24
trusty_tryton-server: needed
25
utopic_tryton-server: ignored (reached end-of-life)
26
vivid_tryton-server: ignored (reached end-of-life)
27
vivid/stable-phone-overlay_tryton-server: DNE
28
vivid/ubuntu-core_tryton-server: DNE
29
wily_tryton-server: ignored (reached end-of-life)
30
xenial_tryton-server: needed
31
yakkety_tryton-server: ignored (reached end-of-life)
32
zesty_tryton-server: ignored (reached end-of-life)
33
artful_tryton-server: needed
34
bionic_tryton-server: needed
35
devel_tryton-server: needed