Safety vulnerability ID: 41318
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Dnsupdate 0.4 includes a security patch for the function '_load_cache' in 'dnsupdate.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/lopsided98/dnsupdate/commit/f708d0b6c7340334199b3a91bdbb626b5da09633#diff-bbb8416d14c72839288c2df5695624f5b1810a9fb4d94ab83750725cddfda472
Latest version: 0.4
A modern and flexible dynamic DNS client
Dnsupdate version 0.4 includes a security patch for the function '_load_cache' in 'dnsupdate.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/lopsided98/dnsupdate/commit/f708d0b6c7340334199b3a91bdbb626b5da09633#diff-bbb8416d14c72839288c2df5695624f5b1810a9fb4d94ab83750725cddfda472
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application