Safety vulnerability ID: 67545
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.
Latest version: 3.0.3.2
Encrypted backup using rsync algorithm
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application