Safety vulnerability ID: 54067
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Transifex command-line client before 0.10 does not validate X.509 certificates for data transfer connections, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-2073.
Latest version: 0.14.4
A command line interface for Transifex
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application