cpe:/a:odoo:odoo:8.0 cpe:/a:odoo:odoo:9.0::~~community~~~ cpe:/a:odoo:odoo:9.0::~~enterprise~~~ cpe:/a:odoo:odoo:10.0::~~community~~~ cpe:/a:odoo:odoo:10.0::~~enterprise~~~ CVE-2017-10804 2017-07-04T14:29:00.227-04:00 2017-07-12T15:04:25.083-04:00 7.5 NETWORK LOW NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2017-07-07T14:30:28.727-04:00 CONFIRM http://initd.org/psycopg/docs/news.html#what-s-new-in-psycopg-2-6-3 CONFIRM https://github.com/odoo/odoo/issues/17914 CONFIRM https://github.com/psycopg/psycopg2/issues/420 In Odoo 8.0, Odoo Community Edition 9.0 and 10.0, and Odoo Enterprise Edition 9.0 and 10.0, remote attackers can bypass authentication under certain circumstances because parameters containing 0x00 characters are truncated before reaching the database layer. This occurs because Psycopg 2.x before 2.6.3 is used.