Safety vulnerability ID: 54111
The information on this page was manually curated by our Cybersecurity Intelligence Team.
file_open in Tryton before 3.2.17, 3.4.x before 3.4.14, 3.6.x before 3.6.12, 3.8.x before 3.8.8, and 4.x before 4.0.4 allows remote authenticated users with certain permissions to read arbitrary files via the name parameter or unspecified other vectors.
Latest version: 7.4.1
Tryton server
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application