Safety vulnerability ID: 42277
The information on this page was manually curated by our Cybersecurity Intelligence Team.
GNS3 ubridge through 0.9.18 on macOS, as used in GNS3 server before 2.1.17, allows a local attacker to read arbitrary files because it handles configuration-file errors by printing the configuration file while executing in a setuid root context.
Latest version: 2.2.52
GNS3 server
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application