Safety vulnerability ID: 41319
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Docutils-Glep 1.2 includes a security patch for the function 'parse' in 'docutils_glep/reader.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/mgorny/docutils-glep/commit/d407ea56b1b91a0ac2450fe13306a0be8cffce41
Latest version: 1.5
docutils modules & wrapper to process Gentoo Linux Enhancement Proposals
Docutils-Glep version 1.2 includes a security patch for the function 'parse' in 'docutils_glep/reader.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/mgorny/docutils-glep/commit/d407ea56b1b91a0ac2450fe13306a0be8cffce41
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application