1
Candidate: CVE-2013-4510
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4510
5
https://bugs.tryton.org/issue3446
7
Directory traversal vulnerability in the client in Tryton 3.0.0, as
8
distributed before 20131104 and earlier, allows remote servers to write
9
arbitrary files via path separators in the extension of a report.
17
Patches_tryton-client:
18
upstream_tryton-client: released (2.8.4-1)
19
lucid_tryton-client: ignored (reached end-of-life)
20
precise_tryton-client: ignored (reached end-of-life)
21
precise/esm_tryton-client: DNE (precise was needs-triage)
22
quantal_tryton-client: ignored (reached end-of-life)
23
raring_tryton-client: ignored (reached end-of-life)
24
saucy_tryton-client: ignored (reached end-of-life)
25
trusty_tryton-client: not-affected (2.8.4-1)
26
utopic_tryton-client: not-affected (2.8.4-1)
27
vivid_tryton-client: not-affected (2.8.4-1)
28
vivid/stable-phone-overlay_tryton-client: DNE
29
vivid/ubuntu-core_tryton-client: DNE
30
wily_tryton-client: not-affected (2.8.4-1)
31
xenial_tryton-client: not-affected (2.8.4-1)
32
yakkety_tryton-client: not-affected (2.8.4-1)
33
zesty_tryton-client: not-affected (2.8.4-1)
34
devel_tryton-client: not-affected (2.8.4-1)