Safety vulnerability ID: 54405
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the server parse a crafted XML SEPA file to access arbitrary files on the system.
Latest version: 7.4.0
Library to access Tryton server as a client
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application