Safety vulnerability ID: 54087
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Trytond 3.2.3, 3.0.7, 2.8.11, 2.6.14 and 2.4.15 include a fix for CVE-2014-6633: The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
https://foss.heptapod.net/tryton/tryton/-/issues/4155
Latest version: 7.4.1
Tryton server
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application