Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-jqfc-9q34-prhg | trytond allows remote attackers to obtain sensitive trace-back (server setup) information |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 01 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 30 Nov 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Tryton trytond before 7.6.11 allows remote attackers to obtain sensitive trace-back (server setup) information. This is fixed in 7.6.11, 7.4.21, 7.0.40, and 6.0.70. | |
| First Time appeared |
Tryton
Tryton trytond |
|
| Weaknesses | CWE-402 | |
| CPEs | cpe:2.3:a:tryton:trytond:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tryton
Tryton trytond |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-01T14:10:40.069Z
Reserved: 2025-11-30T00:00:00.000Z
Link: CVE-2025-66422
Updated: 2025-12-01T13:34:29.450Z
Status : Awaiting Analysis
Published: 2025-11-30T03:15:47.970
Modified: 2025-12-01T15:39:33.110
Link: CVE-2025-66422
No data.
OpenCVE Enrichment
No data.
Github GHSA