PYSEC-2014-72

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/transifex-client/PYSEC-2014-72.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2014-72
Aliases
Published
2014-05-02T01:59:00Z
Modified
2024-05-01T11:41:22.911897Z
Summary
[none]
Details

Transifex command-line client before 0.10 does not validate X.509 certificates for data transfer connections, which allows man-in-the-middle attackers to spoof a Transifex server via an arbitrary certificate. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-2073.

References

Affected packages

PyPI / transifex-client

Package

Name
transifex-client
View open source insights on deps.dev
Purl
pkg:pypi/transifex-client

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.11.0

Affected versions

0.*

0.1
0.2
0.2.1
0.3
0.4
0.4.1
0.5
0.5.1
0.5.2
0.6
0.6.1
0.7
0.7.2
0.7.3
0.8
0.9
0.9.1
0.10
0.11.beta
0.11b3