Safety vulnerability ID: 54404
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
Latest version: 7.4.1
Tryton server
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application