Safety vulnerability ID: 67970
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Transifex command-line client before 0.9 does not validate X.509 certificates, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate.
Latest version: 0.14.4
A command line interface for Transifex
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application