Safety vulnerability ID: 54403
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticated user can send a crafted XML-RPC message to consume all the resources of the server.
Latest version: 7.4.0
Library to access Tryton server as a client
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application